First published: Sat Nov 28 2009(Updated: )
Argument injection vulnerability in the traceroute function in Traceroute.php in the Net_Traceroute package before 0.21.2 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PEAR | <=0.21.1 | |
PHP PEAR | =0.11 | |
PHP PEAR | =0.20 | |
PHP PEAR | =0.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4025 has a moderate severity rating due to its potential for remote command execution.
To fix CVE-2009-4025, upgrade the Net_Traceroute package to version 0.21.2 or later.
CVE-2009-4025 affects Net_Traceroute versions prior to 0.21.2, including versions up to 0.21.1.
Yes, CVE-2009-4025 can be exploited by remote attackers through the host parameter.
The main vulnerability of CVE-2009-4025 is argument injection that allows arbitrary shell command execution.