CVE-2009-3294

The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://bugs.php.net/bug.php?id=44683 - Exploit, Vendor Advisory () http://bugs.php.net/bug.php?id=44683 - Exploit, Vendor Advisory
References () http://news.php.net/php.announce/79 - Vendor Advisory () http://news.php.net/php.announce/79 - Vendor Advisory
References () http://svn.php.net/viewvc?view=revision&revision=287779 - Vendor Advisory () http://svn.php.net/viewvc?view=revision&revision=287779 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2009/09/20/1 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2009/09/20/1 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2009/11/20/2 - Mailing List () http://www.openwall.com/lists/oss-security/2009/11/20/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2009/11/20/3 - Mailing List () http://www.openwall.com/lists/oss-security/2009/11/20/3 - Mailing List
References () http://www.osvdb.org/58188 - Broken Link () http://www.osvdb.org/58188 - Broken Link
References () http://www.php.net/ChangeLog-5.php - Vendor Advisory () http://www.php.net/ChangeLog-5.php - Vendor Advisory
References () http://www.php.net/ChangeLog-5.php#5.2.11 - Vendor Advisory () http://www.php.net/ChangeLog-5.php#5.2.11 - Vendor Advisory
References () http://www.php.net/releases/5_2_11.php - Patch, Vendor Advisory () http://www.php.net/releases/5_2_11.php - Patch, Vendor Advisory
References () http://www.php.net/releases/5_3_1.php - Vendor Advisory () http://www.php.net/releases/5_3_1.php - Vendor Advisory

Information

Published : 2009-09-22 10:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3294

Mitre link : CVE-2009-3294

CVE.ORG link : CVE-2009-3294


JSON object : View

Products Affected

php

  • php

microsoft

  • windows_server_2008
  • windows_xp
  • windows_7
CWE
CWE-134

Use of Externally-Controlled Format String