CVE-2009-4017

PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html Mailing List
http://marc.info/?l=bugtraq&m=127680701405735&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=127680701405735&w=2 Third Party Advisory
http://news.php.net/php.announce/79 Mailing List Release Notes
http://seclists.org/fulldisclosure/2009/Nov/228 Mailing List Third Party Advisory
http://secunia.com/advisories/37482 Broken Link
http://secunia.com/advisories/37821 Broken Link
http://secunia.com/advisories/40262 Broken Link
http://secunia.com/advisories/41480 Broken Link
http://secunia.com/advisories/41490 Broken Link
http://support.apple.com/kb/HT4077 Third Party Advisory
http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ Third Party Advisory
http://www.debian.org/security/2009/dsa-1940 Mailing List Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 Broken Link
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 Broken Link
http://www.openwall.com/lists/oss-security/2009/11/20/2 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/11/20/7 Mailing List
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/releases/5_2_12.php Release Notes
http://www.php.net/releases/5_3_1.php Release Notes Vendor Advisory
http://www.securityfocus.com/archive/1/507982/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3593 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 Broken Link
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html Mailing List
http://marc.info/?l=bugtraq&m=127680701405735&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=127680701405735&w=2 Third Party Advisory
http://news.php.net/php.announce/79 Mailing List Release Notes
http://seclists.org/fulldisclosure/2009/Nov/228 Mailing List Third Party Advisory
http://secunia.com/advisories/37482 Broken Link
http://secunia.com/advisories/37821 Broken Link
http://secunia.com/advisories/40262 Broken Link
http://secunia.com/advisories/41480 Broken Link
http://secunia.com/advisories/41490 Broken Link
http://support.apple.com/kb/HT4077 Third Party Advisory
http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ Third Party Advisory
http://www.debian.org/security/2009/dsa-1940 Mailing List Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 Broken Link
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 Broken Link
http://www.openwall.com/lists/oss-security/2009/11/20/2 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/11/20/7 Mailing List
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/releases/5_2_12.php Release Notes
http://www.php.net/releases/5_3_1.php Release Notes Vendor Advisory
http://www.securityfocus.com/archive/1/507982/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3593 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List
References () http://marc.info/?l=bugtraq&m=127680701405735&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=127680701405735&w=2 - Third Party Advisory
References () http://news.php.net/php.announce/79 - Mailing List, Release Notes () http://news.php.net/php.announce/79 - Mailing List, Release Notes
References () http://seclists.org/fulldisclosure/2009/Nov/228 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2009/Nov/228 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/37482 - Broken Link () http://secunia.com/advisories/37482 - Broken Link
References () http://secunia.com/advisories/37821 - Broken Link () http://secunia.com/advisories/37821 - Broken Link
References () http://secunia.com/advisories/40262 - Broken Link () http://secunia.com/advisories/40262 - Broken Link
References () http://secunia.com/advisories/41480 - Broken Link () http://secunia.com/advisories/41480 - Broken Link
References () http://secunia.com/advisories/41490 - Broken Link () http://secunia.com/advisories/41490 - Broken Link
References () http://support.apple.com/kb/HT4077 - Third Party Advisory () http://support.apple.com/kb/HT4077 - Third Party Advisory
References () http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ - Third Party Advisory () http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ - Third Party Advisory
References () http://www.debian.org/security/2009/dsa-1940 - Mailing List, Third Party Advisory () http://www.debian.org/security/2009/dsa-1940 - Mailing List, Third Party Advisory
References () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 - Broken Link () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 - Broken Link
References () http://www.openwall.com/lists/oss-security/2009/11/20/2 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2009/11/20/2 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2009/11/20/7 - Mailing List () http://www.openwall.com/lists/oss-security/2009/11/20/7 - Mailing List
References () http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory () http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory
References () http://www.php.net/releases/5_2_12.php - Release Notes () http://www.php.net/releases/5_2_12.php - Release Notes
References () http://www.php.net/releases/5_3_1.php - Release Notes, Vendor Advisory () http://www.php.net/releases/5_3_1.php - Release Notes, Vendor Advisory
References () http://www.securityfocus.com/archive/1/507982/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507982/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/3593 - Broken Link () http://www.vupen.com/english/advisories/2009/3593 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 - Broken Link

15 Feb 2024, 21:16

Type Values Removed Values Added
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667 - Broken Link
References (MLIST) http://www.openwall.com/lists/oss-security/2009/11/20/7 - (MLIST) http://www.openwall.com/lists/oss-security/2009/11/20/7 - Mailing List
References (CONFIRM) http://www.php.net/releases/5_3_1.php - Patch, Vendor Advisory (CONFIRM) http://www.php.net/releases/5_3_1.php - Release Notes, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/41490 - (SECUNIA) http://secunia.com/advisories/41490 - Broken Link
References (CONFIRM) http://support.apple.com/kb/HT4077 - (CONFIRM) http://support.apple.com/kb/HT4077 - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:303 - Broken Link
References (MISC) http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ - (MISC) http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/3593 - (VUPEN) http://www.vupen.com/english/advisories/2009/3593 - Broken Link
References (HP) http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 - (HP) http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995 - Broken Link
References (SECUNIA) http://secunia.com/advisories/37821 - (SECUNIA) http://secunia.com/advisories/37821 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483 - Broken Link
References (DEBIAN) http://www.debian.org/security/2009/dsa-1940 - (DEBIAN) http://www.debian.org/security/2009/dsa-1940 - Mailing List, Third Party Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - (APPLE) http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List
References (FULLDISC) http://seclists.org/fulldisclosure/2009/Nov/228 - (FULLDISC) http://seclists.org/fulldisclosure/2009/Nov/228 - Mailing List, Third Party Advisory
References (CONFIRM) http://www.php.net/ChangeLog-5.php - Patch, Vendor Advisory (CONFIRM) http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/40262 - (SECUNIA) http://secunia.com/advisories/40262 - Broken Link
References (HP) http://marc.info/?l=bugtraq&m=127680701405735&w=2 - (HP) http://marc.info/?l=bugtraq&m=127680701405735&w=2 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2009/11/20/2 - Patch (MLIST) http://www.openwall.com/lists/oss-security/2009/11/20/2 - Mailing List, Patch
References (SECUNIA) http://secunia.com/advisories/37482 - (SECUNIA) http://secunia.com/advisories/37482 - Broken Link
References (MLIST) http://news.php.net/php.announce/79 - (MLIST) http://news.php.net/php.announce/79 - Mailing List, Release Notes
References (SECUNIA) http://secunia.com/advisories/41480 - (SECUNIA) http://secunia.com/advisories/41480 - Broken Link
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:305 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/507982/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/507982/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.php.net/releases/5_2_12.php - (CONFIRM) http://www.php.net/releases/5_2_12.php - Release Notes
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54455 - Third Party Advisory, VDB Entry
CWE NVD-CWE-Other CWE-770
CPE cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:-:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:rc4:*:*:*:*:*:*
First Time Apple
Apple mac Os X
Debian
Debian debian Linux

Information

Published : 2009-11-24 00:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-4017

Mitre link : CVE-2009-4017

CVE.ORG link : CVE-2009-4017


JSON object : View

Products Affected

php

  • php

apple

  • mac_os_x

debian

  • debian_linux
CWE
CWE-770

Allocation of Resources Without Limits or Throttling