SB2018103061 - Multiple vulnerabilities in PHP
Published: October 30, 2018 Updated: June 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 78 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2010-4409)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
2) Cross-site scripting (CVE-ID: CVE-2009-5016)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2009-4142)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. The vulnerability allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Input validation error (CVE-ID: CVE-2009-4143)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
5) Input validation error (CVE-ID: CVE-2009-2626)
The vulnerability allows a remote non-authenticated attacker to read memory contents or crash the application.
The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2009-4018)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.
7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2009-3557)
The vulnerability allows a remote non-authenticated attacker to corrupt data.
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.
8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2009-3558)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file. Access Complexity selected medium according to the information from X-force link regarding enabling "open_basedir" option. http://xforce.iss.net/xforce/xfdb/53568
9) Input validation error (CVE-ID: CVE-2009-3291)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.
10) Input validation error (CVE-ID: CVE-2009-3292)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
11) Input validation error (CVE-ID: CVE-2009-3293)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index."
12) Input validation error (CVE-ID: CVE-2008-7068)
The vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (file truncation) via a key with the NULL byte.
13) Cross-site scripting (CVE-ID: CVE-2008-5814)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in PHP, possibly 5.2.7 and earlier, when display_errors is enabled,. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
14) Input validation error (CVE-ID: CVE-2008-4107)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce cryptographically strong random numbers, which allows attackers to leverage exposures in products that rely on these functions for security-relevant functionality, as demonstrated by the password-reset functionality in Joomla! 1.5.x and WordPress before 2.6.2, a different vulnerability than CVE-2008-2107, CVE-2008-2108, and CVE-2008-4102. Download the latest version of PHP to fix this vulnerability: http://www.php.net/downloads.php
15) Input validation error (CVE-ID: CVE-2007-4658)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
16) Link following (CVE-ID: CVE-2007-4652)
The vulnerability allows a local user to read and manipulate data.
The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.
17) Input validation error (CVE-ID: CVE-2007-3799)
The vulnerability allows a remote non-authenticated attacker to corrupt data.
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
18) Input validation error (CVE-ID: CVE-2007-2844)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.
19) Input validation error (CVE-ID: CVE-2007-2727)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.
20) Input validation error (CVE-ID: CVE-2007-2509)
The vulnerability allows a remote non-authenticated attacker to corrupt data.
CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.
21) Buffer overflow (CVE-ID: CVE-2007-2510)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
22) Input validation error (CVE-ID: CVE-2007-2511)
The vulnerability allows a local user to execute arbitrary code.
Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors.
23) Input validation error (CVE-ID: CVE-2007-1883)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
24) Input validation error (CVE-ID: CVE-2007-1884)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary memory location.
25) Input validation error (CVE-ID: CVE-2007-1885)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.
26) Input validation error (CVE-ID: CVE-2007-1888)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
27) Input validation error (CVE-ID: CVE-2007-1890)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.
28) Input validation error (CVE-ID: CVE-2007-1001)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
29) Input validation error (CVE-ID: CVE-2007-1835)
The vulnerability allows a local user to read and manipulate data.
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
30) Input validation error (CVE-ID: CVE-2007-1825)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.
31) Heap-based buffer overflow (CVE-ID: CVE-2007-1777)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5. A remote attacker can use a ZIP archive that contains an entry with a length value of 0xffffffff to trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
32) Input validation error (CVE-ID: CVE-2007-1717)
The vulnerability allows a remote non-authenticated attacker to corrupt data.
The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('