Vulnerability Description
The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | < 5.2.6 |
| Fedoraproject | Fedora | 8 |
| Canonical | Ubuntu Linux | 6.06 |
| Apple | Mac Os X | < 10.5.4 |
| Apple | Mac Os X Server | < 10.5.4 |
Related Weaknesses (CWE)
References
- http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.1Broken LinkExploit
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437Broken Link
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlMailing List
- http://marc.info/?l=bugtraq&m=124654546101607&w=2Mailing List
- http://marc.info/?l=bugtraq&m=125631037611762&w=2Mailing List
- http://secunia.com/advisories/30048Broken LinkVendor Advisory
- http://secunia.com/advisories/30083Broken Link
- http://secunia.com/advisories/30345Broken LinkVendor Advisory
- http://secunia.com/advisories/30616Broken Link
- http://secunia.com/advisories/30757Broken Link
- http://secunia.com/advisories/30828Broken Link
- http://secunia.com/advisories/31200Broken Link
- http://secunia.com/advisories/31326Broken Link
- http://secunia.com/advisories/32746Broken Link
- http://secunia.com/advisories/35650Broken Link
FAQ
What is CVE-2008-0599?
CVE-2008-0599 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attack...
How severe is CVE-2008-0599?
CVE-2008-0599 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2008-0599?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Fedoraproject Fedora, Canonical Ubuntu Linux, Apple Mac Os X, Apple Mac Os X Server.