HIGH · 7.5

CVE-2015-4026

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass in...

Vulnerability Description

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
RedhatEnterprise Linux6.0
PhpPhp<= 5.4.40
AppleMac Os X<= 10.10.4
RedhatEnterprise Linux Desktop7.0
RedhatEnterprise Linux Hpc Node7.0
RedhatEnterprise Linux Hpc Node Eus7.1
RedhatEnterprise Linux Server7.0
RedhatEnterprise Linux Server Eus7.1
RedhatEnterprise Linux Workstation7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4026?

CVE-2015-4026 is a vulnerability with a CVSS score of 7.5 (HIGH). The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass in...

How severe is CVE-2015-4026?

CVE-2015-4026 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4026?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Php Php, Apple Mac Os X, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node.