Description
The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2004-1062 | The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion. |
Ubuntu USN |
USN-99-1 | PHP4 vulnerabilities |
Ubuntu USN |
USN-99-2 | Fixed php4 packages for USN-99-1 |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:39:00.828Z
Reserved: 2004-11-23T00:00:00.000Z
Link: CVE-2004-1064
No data.
Status : Deferred
Published: 2005-01-10T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-1064
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN