5
CVSSv2

CVE-2009-3557

Published: 23/11/2009 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The tempnam function in ext/standard/file.c in PHP prior to 5.2.12 and 5.3.x prior to 5.3.1 allows context-dependent malicious users to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 3.0.11

php php 3.0.12

php php 3.0.2

php php 3.0.3

php php 4.0

php php 4.0.0

php php 4.2.0

php php 4.3.1

php php 5.0.0

php php 5.0.3

php php 4.4.9

php php 5.2.10

php php 2.0

php php 2.0b10

php php 3.0

php php 3.0.15

php php 1.0

php php 3.0.13

php php 3.0.14

php php 3.0.4

php php 3.0.5

php php 4.0.1

php php 4.0.2

php php 4.0.3

php php 4.2.1

php php 4.3.10

php php 4.3.11

php php 4.3.2

php php 5.1.1

php php 5.2.1

php php

php php 3.0.16

php php 3.0.6

php php 3.0.7

php php 4.0.4

php php 4.0.5

php php 4.1.0

php php 4.2.2

php php 4.2.3

php php 4.3.7

php php 4.4.2

php php 5.2.5

php php 5.2.6

php php 3.0.1

php php 3.0.10

php php 3.0.17

php php 3.0.18

php php 3.0.8

php php 3.0.9

php php 4.0.6

php php 4.0.7

php php 4.1.1

php php 4.1.2

php php 4.3.0

php php 4.4.7

php php 5.3.0

php php 4.4.8

Vendor Advisories

Maksymilian Arciemowicz discovered that PHP did not properly validate arguments to the dba_replace function If a script passed untrusted input to the dba_replace function, an attacker could truncate the database This issue only applied to Ubuntu 606 LTS, 804 LTS, and 810 (CVE-2008-7068) ...