Описание
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 5.5.12+dfsg-2ubuntu1 |
| esm-infra-legacy/trusty | released | 5.5.9+dfsg-1ubuntu4.1 |
| lucid | not-affected | code not present |
| precise | released | 5.3.10-1ubuntu3.12 |
| quantal | ignored | end of life |
| saucy | released | 5.5.3+dfsg-1ubuntu2.4 |
| trusty | released | 5.5.9+dfsg-1ubuntu4.1 |
| trusty/esm | released | 5.5.9+dfsg-1ubuntu4.1 |
| upstream | needs-triage |
Показывать по
7.2 High
CVSS2
Связанные уязвимости
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP be ...
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
Уязвимость интерпретатора PHP, позволяющая удаленному злоумышленнику повысить свои привилегии
7.2 High
CVSS2