First published: Fri Apr 18 2008(Updated: )
Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unquoted [a-z] argument as a matching shell glob for this name, rather than interpretation as the literal [a-z] regular-expression string, and consequently blocks the launch of the PHP interpreter within the Apache HTTP Server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Gentoo Php Toolkit | <=1.0 | |
Gentoo Php Toolkit | =1.0 | |
Gentoo Php Toolkit | =1.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1734 has been classified as a moderate severity vulnerability due to potential denial of service and unauthorized access to PHP script contents.
To fix CVE-2008-1734, users should upgrade to a version of the PHP Toolkit that is greater than 1.0.1.
CVE-2008-1734 affects Gentoo Linux systems running versions of the PHP Toolkit up to and including 1.0.
CVE-2008-1734 requires local user access to exploit the vulnerability, thus it cannot be exploited remotely.
Exploiting CVE-2008-1734 can lead to denial of service attacks and exposure of PHP script content by creating files with specific names.