First published: Tue Dec 19 2000(Updated: )
PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =3.0 | |
PHP | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0967 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2000-0967, upgrade to a more secure version of PHP, preferably PHP 5 or later.
CVE-2000-0967 can allow remote attackers to execute arbitrary commands on your server by exploiting improper input handling.
CVE-2000-0967 affects PHP versions 3.x and 4.x.
While the best solution is to upgrade PHP, you can mitigate CVE-2000-0967 by implementing strict input validation and sanitization.