The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0549.html cve-icon cve-icon
http://secunia.com/advisories/17371 cve-icon cve-icon
http://secunia.com/advisories/17490 cve-icon cve-icon
http://secunia.com/advisories/17510 cve-icon cve-icon
http://secunia.com/advisories/17531 cve-icon cve-icon
http://secunia.com/advisories/17557 cve-icon cve-icon
http://secunia.com/advisories/17559 cve-icon cve-icon
http://secunia.com/advisories/18054 cve-icon cve-icon
http://secunia.com/advisories/18198 cve-icon cve-icon
http://secunia.com/advisories/18669 cve-icon cve-icon
http://secunia.com/advisories/21252 cve-icon cve-icon
http://secunia.com/advisories/22691 cve-icon cve-icon
http://securityreason.com/securityalert/134 cve-icon cve-icon
http://securitytracker.com/id?1015131 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm cve-icon cve-icon
http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml cve-icon cve-icon
http://www.hardened-php.net/advisory_192005.78.html cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:213 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2005_27_sr.html cve-icon cve-icon
http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html cve-icon cve-icon
http://www.php.net/release_4_4_1.php cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-831.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-838.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/415291 cve-icon cve-icon
http://www.securityfocus.com/archive/1/419504/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/15249 cve-icon cve-icon
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2254 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4320 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-3389 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-3389 cve-icon
https://www.ubuntu.com/usn/usn-232-1/ cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T23:10:08.579Z

Reserved: 2005-11-01T00:00:00

Link: CVE-2005-3389

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2005-11-01T12:47:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2005-3389

cve-icon Redhat

Severity : Low

Publid Date: 2005-10-31T00:00:00Z

Links: CVE-2005-3389 - Bugzilla

cve-icon OpenCVE Enrichment

No data.