From 02823cab7df3d46c48b7d75d1269a15d5244f342 Mon Sep 17 00:00:00 2001 From: stas Date: Sun, 22 Jun 2008 09:17:51 +0000 Subject: - Document php5-posix directory traversal vulnerability. --- security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1e96abd1740a..8384a0fdc9a9 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file. --> + + php -- input validation error in posix_access function + + + php5-posix + 5.0 + + + + +

According to Maksymilian Arciemowicz research, + it is possible to bypass security restrictions + of safe_mode in posix_access() function via + directory traversal vulnerability. The attacker + can use this attack to gain access to sensitive + information. Other functions utilizing expand_filepath() + may be affected.

+ +
+ + CVE-2008-2665 + 29797 + http://securityreason.com/achievement_securityalert/54 + + + 2008-06-17 + 2008-06-22 + +
+ vim -- Vim Shell Command Injection Vulnerabilities -- cgit