First published: Mon May 05 2008(Updated: )
The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.1.5 | |
PHP | =5.1.2 | |
PHP | =5.1.1 | |
PHP | =5.0.0-beta1 | |
PHP | =5.1.6 | |
PHP | =5.2.2 | |
PHP | =5.0.5 | |
PHP | =5.0.1 | |
PHP | =5.1.4 | |
PHP | =5.0.4 | |
PHP | =5.0.0-rc2 | |
PHP | =5.2.3 | |
PHP | =5.0.3 | |
PHP | =5.1.0 | |
PHP | =5.0.0-rc3 | |
PHP | <=5.2.5 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.0.0-beta3 | |
PHP | =5.1.3 | |
PHP | =5.0.0-rc1 | |
PHP | =5.0.2 | |
PHP | =5.2.1 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0-beta2 | |
PHP | <5.2.6 | |
Fedora | =8 | |
Fedora | =9 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Apple iOS and macOS | <10.5.4 | |
Apple macOS Server | <10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0599 is rated as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2008-0599, upgrade your PHP version to 5.2.6 or later.
CVE-2008-0599 affects PHP versions prior to 5.2.6, including 5.1.x and 5.0.x versions.
Yes, CVE-2008-0599 can be exploited remotely through crafted URIs.
CVE-2008-0599 could allow attackers to execute arbitrary code on vulnerable PHP installations.