5
CVSSv2

CVE-2005-3389

Published: 01/11/2005 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote malicious users to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows malicious users to exploit vulnerabilities in PHP applications that would otherwise be protected.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.1

php php 4.0.7

php php 4.2.1

php php 4.2.2

php php 4.3.3

php php 4.3.4

php php 5.0.0

php php 5.0.1

php php 5.0.2

php php 5.0.3

php php 4.0.3

php php 4.0.4

php php 4.1.0

php php 4.1.1

php php 4.3.1

php php 4.3.10

php php 4.3.7

php php 4.3.8

php php 4.0.2

php php 4.2.3

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 5.0.4

php php 5.0.5

php php 4.0.0

php php 4.0.5

php php 4.0.6

php php 4.1.2

php php 4.2.0

php php 4.3.11

php php 4.3.2

php php 4.3.9

php php 4.4.0

Vendor Advisories

Eric Romang discovered a local Denial of Service vulnerability in the handling of the ‘sessionsave_path’ parameter in PHP’s Apache 20 module By setting this parameter to an invalid value in an htaccess file, a local user could crash the Apache server (CVE-2005-3319) ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 21This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Debian Bug report logs - #336654 PHP 505 contains unfixed security bugs Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 31 Oct 2005 20:48:02 UTC Severity ...
Debian Bug report logs - #336645 PHP 441 fixes security bugs Package: php4; Maintainer for php4 is (unknown); Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 31 Oct 2005 19:48:02 UTC Severity: grave Tags: security Found in version php4/4:4310-16 Fixed in version php4/4:442-1 Done: Adam Conrad <adconrad ...
Debian Bug report logs - #341368 CVE-2005-3883: Injection of arbitrary values into the To:-header of the md_send_mail() function Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inuti ...
Debian Bug report logs - #336004 CVE-2005-3319: mod_php DoS through sessionsave_path option Package: php4; Maintainer for php4 is (unknown); Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 27 Oct 2005 10:48:02 UTC Severity: important Tags: security Found in version php4/4:440-4 Fixed in version php4/4:442 ...

References

NVD-CWE-Otherhttp://www.hardened-php.net/advisory_192005.78.htmlhttp://www.php.net/release_4_4_1.phphttp://www.securityfocus.com/bid/15249http://secunia.com/advisories/17371http://securitytracker.com/id?1015131http://www.gentoo.org/security/en/glsa/glsa-200511-08.xmlhttp://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.htmlhttp://www.openpkg.org/security/OpenPKG-SA-2005.027-php.htmlhttp://secunia.com/advisories/18054http://secunia.com/advisories/18198http://secunia.com/advisories/17559http://www.redhat.com/support/errata/RHSA-2005-831.htmlhttp://www.redhat.com/support/errata/RHSA-2005-838.htmlhttp://secunia.com/advisories/17490http://secunia.com/advisories/17510http://secunia.com/advisories/17531http://secunia.com/advisories/17557http://support.avaya.com/elmodocs2/security/ASA-2006-037.htmhttp://secunia.com/advisories/18669http://www.novell.com/linux/security/advisories/2005_27_sr.htmlhttp://secunia.com/advisories/21252http://www.securityfocus.com/archive/1/415291http://rhn.redhat.com/errata/RHSA-2006-0549.htmlhttp://secunia.com/advisories/22691http://www.turbolinux.com/security/2006/TLSA-2006-38.txthttp://www.mandriva.com/security/advisories?name=MDKSA-2005:213http://securityreason.com/securityalert/134http://www.vupen.com/english/advisories/2005/2254http://www.vupen.com/english/advisories/2006/4320http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522https://www.ubuntu.com/usn/usn-232-1/https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481http://www.securityfocus.com/archive/1/419504/100/0/threadedhttps://usn.ubuntu.com/232-1/https://nvd.nist.gov