~tsimonq2/ubuntu-cve-tracker/triage

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Candidate: CVE-2008-7002
PublicDate: 2009-08-19
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002
Description:
 PHP 5.2.5 does not enforce (a) open_basedir and (b) safe_mode_exec_dir
 restrictions for certain functions, which might allow local users to bypass
 intended access restrictions and call programs outside of the intended
 directory via the (1) exec, (2) system, (3) shell_exec, (4) passthru, or
 (5) popen functions, possibly involving pathnames such as "C:" drive
 notation.
Ubuntu-Description:
Notes:
 jdstrand> PoC at http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php
 mdeslaur> The "PoC" doesn't turn on safe_mode, so of course
 mdeslaur> safe_mode_exec_dir doesn't work. Ignoring.
Bugs:
Priority: low
Discovered-by:
Assigned-to:

Patches_php5:
upstream_php5: needs-triage
dapper_php5: ignored
hardy_php5: ignored
intrepid_php5: ignored
jaunty_php5: ignored
devel_php5: ignored