CVE-2011-2202 – PHP 5.3.6 - Security Bypass
https://notcve.org/view.php?id=CVE-2011-2202
The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability." La función rfc1867_post_handler en main/rfc1867.c en PHP anterior a v5.3.7 no restringe correctamente los nombres de archivo en solicitudes POST multipart/form-data, lo que permite a atacantes remotos llevar a cabo ataques de salto de directorio, y, posiblemente, crear o sobreescribir archivos arbitrarios, a través de una elaborada petición de carga, en relación con una "vulnerabilidad de inyección de la ruta del archivo" (file path injection vulnerability) • https://www.exploit-db.com/exploits/35855 http://bugs.php.net/bug.php?id=54939 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://marc.info/?l=bugtraq&m=133469208622507&w=2 http://openwall.com/lists/oss-security/2011/06/12/5 http://openwall.com/lists/oss-security/2011/06/13/15 http://pastebin.com/1edSuSVN http://rhn.redhat.com/errata/RHSA-2012-0071.html http://secunia.com/advisories/44874 http://securitytracker.com/id?1025659 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-1938 – PHP 5.3.5 - 'socket_connect()' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2011-1938
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket. Desbordamiento de búfer basado en pila en la función socket_connect en ext/sockets/sockets.c en PHP v5.3.3 a v5.3.6 podría permitir a atacantes dependientes de contexto ejecutar código de su elección a través de una ruta larga para un socket UNIX. • https://www.exploit-db.com/exploits/17318 https://www.exploit-db.com/exploits/17486 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://marc.info/?l=bugtraq&m=133469208622507&w=2 http://openwall.com/lists/oss-security/2011/05/24/1 http://openwall.com/lists/oss-security/2011/05/24/9 http://osvdb.org/72644 http://securityreason.com/securityalert/8262 http://securityreason.com/securityalert/8294 http://support.apple.com/kb/HT5130 http: • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •
CVE-2011-0441
https://notcve.org/view.php?id=CVE-2011-0441
The Debian GNU/Linux /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/. La tarea de cron /etc/cron.d/php5 de Debian GNU/Linux para PHP 5.3.5 permite a usuarios locales eliminar ficheros de su elección a través de un ataque symlink en un directorio bajo /var/lib/php5/. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618489 http://git.debian.org/?p=pkg-php/php.git%3Ba=commit%3Bh=d09fd04ed7bfcf7f008360c6a42025108925df09 http://www.mandriva.com/security/advisories?name=MDVSA-2011:069 http://www.securityfocus.com/bid/46928 http://www.vupen.com/english/advisories/2011/0910 https://exchange.xforce.ibmcloud.com/vulnerabilities/66180 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2011-1468 – PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service
https://notcve.org/view.php?id=CVE-2011-1468
Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function. Múltiples fugas de memoria en la extensión OpenSSL de PHP anteriores a v5.3.6 podría permitir a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de (1) datos en texto plano sobre la función openssl_encrypt o (2) Los datos de texto cifrado a la función openssl_decrypt. • https://www.exploit-db.com/exploits/35487 https://www.exploit-db.com/exploits/35486 http://bugs.php.net/bug.php?id=54060 http://bugs.php.net/bug.php?id=54061 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://support.apple.com/kb/HT5002 http://www.mandriva.com/security/advisories?name=MDVSA-2011:053 http://www.php.net/ChangeLog-5.php http://www.redhat.com/support/errata/RHSA-2011-1423.html http://www.securityfocus.com/bid/46 • CWE-399: Resource Management Errors CWE-401: Missing Release of Memory after Effective Lifetime •
CVE-2011-1466 – php: Crash by converting serial day numbers (SDN) into Julian calendar
https://notcve.org/view.php?id=CVE-2011-1466
Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function. Desbordamiento de enteros en la función SdnToJulian en la extensión CAlendar en PHP anterior a v5.3.6 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída de la aplicación) a través de un entero largo en el primer argumento a la función cal_from_jd. • http://bugs.php.net/bug.php?id=53574 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html http://rhn.redhat.com/errata/RHSA-2012-0071.html http://secunia.com/advisories/48668 http://support.apple.com/kb/HT5002 http://www.debian.org/security/2011/dsa-2266 http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 http://www.mandriva.com/security/advisories?name=MDVSA-2011: • CWE-189: Numeric Errors •