PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2001-1 | New php5 packages fix multiple vulnerabilities |
Debian DSA |
DSA-2002-1 | New polipo packages fix denial of service |
EUVD |
EUVD-2009-4113 | PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive. |
Ubuntu USN |
USN-882-1 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:54:09.936Z
Reserved: 2009-12-01T00:00:00
Link: CVE-2009-4143
No data.
Status : Deferred
Published: 2009-12-21T16:30:00.360
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-4143
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN