Bug 853329 (CVE-2011-1398) - CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass
Summary: CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-1398
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 865986 958614 1037490 1037491
Blocks: 854174 855229 952520
TreeView+ depends on / blocked
 
Reported: 2012-08-31 05:15 UTC by Kurt Seifried
Modified: 2023-09-25 12:30 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-12-11 10:33:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0514 0 normal SHIPPED_LIVE Moderate: php security, bug fix and enhancement update 2013-02-20 21:29:20 UTC
Red Hat Product Errata RHSA-2013:1307 0 normal SHIPPED_LIVE Moderate: php53 security, bug fix and enhancement update 2013-10-01 00:31:22 UTC
Red Hat Product Errata RHSA-2013:1814 0 normal SHIPPED_LIVE Critical: php security update 2013-12-11 07:25:07 UTC

Description Kurt Seifried 2012-08-31 05:15:13 UTC
This was originally reported by rui_hirokawa.jp to the PHP project.

The CVE database entry reports:

The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 does
not properly handle %0D sequences (aka carriage return characters),
which allows remote attackers to bypass an HTTP response-splitting
protection mechanism via a crafted URL, related to improper
interaction between the PHP header function and certain browsers, as
demonstrated by Internet Explorer and Google Chrome.

Upstream bug and fix:

https://bugs.php.net/bug.php?id=60227
https://bugs.php.net/patch-display.php?bug_id=60227&patch=SAPI.diff&revision=latest
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986


External references:

(none)

Comment 8 errata-xmlrpc 2013-02-21 10:14:26 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0514 https://rhn.redhat.com/errata/RHSA-2013-0514.html

Comment 13 errata-xmlrpc 2013-09-30 22:12:28 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1307 https://rhn.redhat.com/errata/RHSA-2013-1307.html

Comment 15 Huzaifa S. Sidhpurwala 2013-10-03 10:58:16 UTC
Statement:

(none)

Comment 18 errata-xmlrpc 2013-12-11 02:25:58 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1814 https://rhn.redhat.com/errata/RHSA-2013-1814.html


Note You need to log in before you can comment on or make changes to this bug.