First published: Sat Nov 28 2009(Updated: )
Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PEAR | =2.3 | |
PHP PEAR | =2.2 | |
PHP PEAR | =2.4.3 | |
PHP PEAR | <=2.4.4 | |
PHP PEAR | =2.4.1 | |
PHP PEAR | =1.0 | |
PHP PEAR | =2.4.2 | |
PHP PEAR | =2.1 | |
PHP PEAR | =1.0.1 | |
PHP PEAR | =2.4 | |
PHP PEAR | =0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4024 is considered to have a high severity due to the potential for remote command execution.
To fix CVE-2009-4024, upgrade to Net_Ping version 2.4.5 or later.
CVE-2009-4024 allows attackers to execute arbitrary shell commands through the host parameter.
CVE-2009-4024 affects Net_Ping versions prior to 2.4.5, including versions 1.0 through 2.4.4.
The impact of CVE-2009-4024 on system security includes the risk of unauthorized command execution, potentially compromising the system.