First published: Tue Mar 07 2006(Updated: )
Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | =4.0.0 | |
PHP PHP | =4.2 | |
PHP PHP | =4.3.3 | |
PHP PHP | =4.3.4 | |
PHP PHP | =4.3.5 | |
PHP PHP | =4.3.6 | |
PHP PHP | =4.3.7 | |
PHP PHP | =4.3.8 | |
PHP PHP | =4.3.9 | |
PHP PHP | =4.3.10 | |
PHP PHP | =4.3.11 | |
PHP PHP | =4.4.0 | |
PHP PHP | =4.4.1 | |
PHP PHP | =5.0-rc1 | |
PHP PHP | =5.0-rc2 | |
PHP PHP | =5.0-rc3 | |
PHP PHP | =5.0.0 | |
PHP PHP | =5.0.0-beta1 | |
PHP PHP | =5.0.0-beta2 | |
PHP PHP | =5.0.0-beta3 | |
PHP PHP | =5.0.0-beta4 | |
PHP PHP | =5.0.0-rc1 | |
PHP PHP | =5.0.0-rc2 | |
PHP PHP | =5.0.0-rc3 | |
PHP PHP | =5.0.1 | |
PHP PHP | =5.0.2 | |
PHP PHP | =5.0.3 | |
PHP PHP | =5.0.4 | |
PHP PHP | =5.0.5 | |
PHP PHP | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.