Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-7068

Опубликовано: 25 авг. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.4

Описание

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.17
devel

not-affected

5.2.11.dfsg.1-1ubuntu1
hardy

released

5.2.4-2ubuntu5.9
intrepid

released

5.2.6-2ubuntu4.5
jaunty

not-affected

5.2.6.dfsg.1-3ubuntu4.2
karmic

not-affected

5.2.10.dfsg.1-2ubuntu6.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 69%
0.00603
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.

nvd
почти 16 лет назад

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.

debian
почти 16 лет назад

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent ...

github
около 3 лет назад

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.

EPSS

Процентиль: 69%
0.00603
Низкий

6.4 Medium

CVSS2