First published: Tue Sep 24 2002(Updated: )
The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.2.0 | |
PHP | =4.1.0 | |
PHP | =4.0.4 | |
PHP | =4.0.5 | |
PHP | =4.2.2 | |
PHP | =4.0.3-patch1 | |
PHP | =4.0.7 | |
PHP | =4.0.2 | |
PHP | =4.1.1 | |
PHP | =4.0.1-patch1 | |
PHP | =4.0 | |
PHP | =4.0.1-patch2 | |
PHP | =4.0.6 | |
PHP | =4.1.2 | |
PHP | =3.0.18 | |
PHP | =4.2.1 | |
PHP | =4.0.1 | |
PHP | =4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0986 is classified as a moderate severity vulnerability.
To mitigate CVE-2002-0986, upgrade your PHP version to 4.2.3 or later, which addresses the issue.
CVE-2002-0986 affects PHP versions from 4.0.1 to 4.2.2.
Yes, CVE-2002-0986 can be exploited by remote attackers to manipulate email content.
CVE-2002-0986 can allow attackers to use PHP as a spam proxy by injecting control characters in email headers.