First published: Tue Sep 22 2009(Updated: )
The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=5.2.0<5.2.11 | |
PHP | >=5.3.0<5.3.1 | |
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows XP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3294 is categorized as a medium severity vulnerability that can lead to a denial of service.
To fix CVE-2009-3294, upgrade to PHP version 5.2.11 or 5.3.1 or later.
CVE-2009-3294 affects PHP versions prior to 5.2.11 and 5.3.x versions prior to 5.3.1 on certain Windows operating systems.
CVE-2009-3294 allows attackers to cause a denial of service by exploiting the popen API function with crafted arguments.
CVE-2009-3294 specifically occurs on certain Windows operating systems running affected versions of PHP.