Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5624

Опубликовано: 17 дек. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.13
devel

not-affected

5.2.6.dfsg.1-3ubuntu2
gutsy

released

5.2.3-1ubuntu6.5
hardy

released

5.2.4-2ubuntu5.5
intrepid

released

5.2.6-2ubuntu4.1
jaunty

not-affected

5.2.6.dfsg.1-3ubuntu2
karmic

not-affected

5.2.6.dfsg.1-3ubuntu2
upstream

released

5.2.6.dfsg.1-1

Показывать по

EPSS

Процентиль: 85%
0.02728
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

nvd
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

debian
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_ ...

github
около 3 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

EPSS

Процентиль: 85%
0.02728
Низкий

7.5 High

CVSS2