
CVE-2011-1072 – php-pear: symlink vulnerability in PEAR installer
https://notcve.org/view.php?id=CVE-2011-1072
03 Mar 2011 — The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519. El instalador de PEAR en versiones anteriores a la 1.9.2 permite a usuarios locales sobreescribir ficheros de su elección a través de un ataque de enlace simbólico ("symlink attack") en el fichero package.xml. Relacionado con los direc... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2011-1144 – Gentoo Linux Security Advisory 201412-09
https://notcve.org/view.php?id=CVE-2011-1144
03 Mar 2011 — The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072. El instalador de PEAR 1.9.2 y versiones anteriores permite a los usuarios locales sobreescribir archivos de su elección a través de un ataque de enlace simbólico ("symlink attack") en el fichero p... • http://openwall.com/lists/oss-security/2011/02/28/5 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-4024
https://notcve.org/view.php?id=CVE-2009-4024
28 Nov 2009 — Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem. La vulnerabilidad de inyección de argumentos en la función ping en el archivo Ping.php en el paquete Net_Ping anterior a versión 2.4.5 para PEAR, permite a los atacantes remotos ejecutar comandos de shell arbitrarios por medio del parámetro host. N... • http://blog.pear.php.net/2009/11/14/net_traceroute-and-net_ping-security-advisory • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2007-2519 – PHP PEAR 1.5.3 - INSTALL-AS Attribute Arbitrary File Overwrite
https://notcve.org/view.php?id=CVE-2007-2519
22 May 2007 — Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0. NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions. Vulnerabilidad de salto de directorio en e... • https://www.exploit-db.com/exploits/30074 •

CVE-2005-4154
https://notcve.org/view.php?id=CVE-2005-4154
11 Dec 2005 — Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded. Vulnerabilidad no especificad en el PEAR installer 1.4.2 y anteriores permite a atacantes con la implicación de los usuarios ejecutar código de su elección mediante un paquete artesanal que puede ejecutar cóidog cuando el comando 'pear' es ejecutado cuando el frontal Web/Gtk... • http://pear.php.net/advisory-20051104.txt •