Vulnerability Description
Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 for PEAR allows remote attackers to read and write arbitrary files via a crafted $from parameter, a different vector than CVE-2009-4111.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pear | Pear | 1.1.14 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
- http://pear.php.net/bugs/bug.php?id=16200ExploitPatchVendor Advisory
- http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=12417PatchVendor Advisory
- http://secunia.com/advisories/37410Vendor Advisory
- http://secunia.com/advisories/37458
- http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r
- http://www.debian.org/security/2009/dsa-1938
- http://www.openwall.com/lists/oss-security/2009/11/23/8
- http://www.securityfocus.com/bid/37081Patch
- http://www.vupen.com/english/advisories/2009/3300Patch
- https://bugs.gentoo.org/show_bug.cgi?id=294256
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54362
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
- http://pear.php.net/bugs/bug.php?id=16200ExploitPatchVendor Advisory
- http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=12417PatchVendor Advisory
FAQ
What is CVE-2009-4023?
CVE-2009-4023 is a vulnerability with a CVSS score of 7.5 (HIGH). Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 for PEAR allows remote attackers to read and write arbitrary fil...
How severe is CVE-2009-4023?
CVE-2009-4023 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4023?
Check the references section above for vendor advisories and patch information. Affected products include: Pear Pear.