10
CVSSv2

CVE-2004-1064

Published: 10/01/2005 Updated: 08/12/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow malicious users to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

canonical ubuntu linux 4.10

Vendor Advisories

Stefano Di Paola discovered integer overflows in PHP’s pack() and unpack() functions A malicious PHP script could exploit these to break out of safe mode and execute arbitrary code with the privileges of the PHP interpreter (CAN-2004-1018) ...
USN-99-1 fixed a safe mode bypass which allowed malicious PHP scripts to circumvent path restrictions by creating a specially crafted directory whose length exceeded the capacity of the realpath() function (CAN-2004-1064) However, this caused severe regressions, some applications like SquirrelMail and Gallery did not work any more, and the package ...