First published: Tue Nov 24 2009(Updated: )
PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.11 | |
PHP | =5.3.0 | |
PHP | <5.2.12 | |
PHP | =5.3.0 | |
PHP | =5.3.0-alpha1 | |
PHP | =5.3.0-alpha2 | |
PHP | =5.3.0-alpha3 | |
PHP | =5.3.0-beta1 | |
PHP | =5.3.0-rc1 | |
PHP | =5.3.0-rc2 | |
PHP | =5.3.0-rc3 | |
PHP | =5.3.0-rc4 | |
Apple iOS and macOS | =10.6.3 | |
Debian Linux | =4.0 | |
Debian Linux | =5.0 | |
Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4017 has a medium severity rating as it can lead to denial of service through resource exhaustion.
To mitigate CVE-2009-4017, update PHP to version 5.2.12 or 5.3.1 or later.
PHP versions before 5.2.12 and 5.3.x before 5.3.1 are affected by CVE-2009-4017.
CVE-2009-4017 allows remote attackers to cause denial of service through excessive temporary file creation.
Yes, CVE-2009-4017 increases the potential for local file inclusion attacks due to the inadequacy in handling temporary files.