First published: Tue Sep 24 2002(Updated: )
Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.2.0 | |
PHP | =4.1.0 | |
PHP | =4.0.4 | |
PHP | =4.0.5 | |
PHP | =4.2.2 | |
PHP | =4.0.3-patch1 | |
PHP | =4.0.7 | |
PHP | =4.0.2 | |
PHP | =4.1.1 | |
PHP | =4.0.1-patch1 | |
PHP | =4.0 | |
PHP | =4.0.1-patch2 | |
PHP | =4.0.6 | |
PHP | =4.1.2 | |
PHP | =3.0.18 | |
PHP | =4.2.1 | |
PHP | =4.0.1 | |
PHP | =4.0.3 | |
PHP | >=4.0<=4.2.2 | |
openpkg openpkg | =1.1 | |
openpkg openpkg | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0985 has a medium severity rating, as it allows for argument injection that can potentially alter MTA behavior.
To fix CVE-2002-0985, upgrade PHP to a version newer than 4.2.2 or apply relevant patches provided by the PHP project.
CVE-2002-0985 affects PHP versions from 4.0.x up to 4.2.2, including multiple specific past versions.
Yes, CVE-2002-0985 can allow attackers to modify command line arguments, potentially leading to remote code execution under certain conditions.
A temporary workaround for CVE-2002-0985 includes disabling PHP safe mode, but this is not recommended due to other security risks.