Bug 205003 (CVE-2006-3011)
| Summary: | CVE-2006-3011 multiple PHP safe mode bypasses (CVE-2006-4481, CVE-2006-2563) | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 4 | Reporter: | Josh Bressers <bressers> |
| Component: | php | Assignee: | Joe Orton <jorton> |
| Status: | CLOSED DUPLICATE | QA Contact: | David Lawrence <dkl> |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | 4.0 | CC: | hamid |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | source=cve,reported=20060626,public=20060626,impact=low | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2006-09-15 12:44:11 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
These issues should also affect RHEL2.1 and RHEL3 These issues also affect FC4 |
Several issues were discovered which can lead to a condition where the safe_mode or open_basedir directives can be overridden. It should be noted that neither safe_mode or open_basedir are considered safe and are not suggested to be used as security measures. CVE-2006-3011 Added missing safe_mode/open_basedir checks inside the error_log() function http://www.securityfocus.com/archive/1/archive/1/438436/100/0/threaded http://cvs.php.net/viewvc.cgi/php-src/ext/standard/basic_functions.c?r1=1.543.2.51.2.9&r2=1.543.2.51.2.10 CVE-2006-4481 Added missing safe_mode/open_basedir checks inside the file_exists(), imap_open() and imap_reopen() functions. http://bugs.php.net/bug.php?id=37265 http://cvs.php.net/viewvc.cgi/php-src/ext/imap/php_imap.c?r1=1.217&r2=1.218 CVE-2006-2563 Fixed possible open_basedir/safe_mode bypass in cURL extension http://www.securityfocus.com/archive/1/archive/1/435194/100/0/threaded http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14&r2=1.62.2.15