Vulnerability Name:

CVE-2005-4154 (CCN-23021)

Assigned:2005-11-07
Published:2005-11-07
Updated:2020-01-23
Summary:Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-4154

Source: CCN
Type: PEAR Web site
PEAR :: The PHP Extension and Application Repository

Source: CCN
Type: PEAR SECURITY VULNERABILITY ANNOUNCEMENT November 4, 2005
PEAR installer arbitrary code execution vulnerability

Source: CONFIRM
Type: Patch, Vendor Advisory
http://pear.php.net/advisory-20051104.txt

Source: CCN
Type: SA17563
PEAR Installer Arbitrary Code Execution Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
17563

Source: SECTRACK
Type: Patch
1015161

Source: CCN
Type: SECTRACK ID: 1015161
PEAR Installer Lets Remote Users Execute Arbitrary Code in Certain Cases

Source: CCN
Type: OSVDB ID: 20856
PEAR Installer Crafted Package Arbitrary Command Execution

Source: VUPEN
Type: Vendor Advisory
ADV-2005-2444

Source: XF
Type: UNKNOWN
pear-installer-code-execution(23021)

Source: XF
Type: UNKNOWN
pear-installer-code-execution(23021)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:pear:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.11:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:*:*:*:*:*:*:*:* (Version <= 1.4.2)

  • Configuration CCN 1:
  • cpe:/a:php:pear:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.11:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0:b1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0:b2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.0:b3:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:b1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:b2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:b3:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:b4:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.2:b5:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:b1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:b2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:b3:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:b5:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.3:b6:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a1:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a10:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a11:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a12:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a2:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a3:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a4:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a5:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a6:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a7:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a8:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.0:a9:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:1.4.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    php pear 0.9
    php pear 0.10
    php pear 0.11
    php pear 0.90
    php pear 1.0
    php pear 1.0.1
    php pear 1.1
    php pear 1.2
    php pear 1.2.1
    php pear 1.3
    php pear 1.3.1
    php pear 1.3.3
    php pear 1.3.3.1
    php pear 1.3.4
    php pear 1.3.5
    php pear 1.3.6
    php pear 1.4.0
    php pear 1.4.0 rc1
    php pear 1.4.0 rc2
    php pear 1.4.1
    php pear *
    php pear 0.10
    php pear 0.11
    php pear 0.9
    php pear 0.90
    php pear 1.0
    php pear 1.0.1
    php pear 1.0b1
    php pear 1.0b2
    php pear 1.0b3
    php pear 1.1
    php pear 1.2
    php pear 1.2.1
    php pear 1.2b1
    php pear 1.2b2
    php pear 1.2b3
    php pear 1.2b4
    php pear 1.2b5
    php pear 1.3
    php pear 1.3.1
    php pear 1.3.3
    php pear 1.3.3.1
    php pear 1.3.4
    php pear 1.3.5
    php pear 1.3.6
    php pear 1.3b1
    php pear 1.3b2
    php pear 1.3b3
    php pear 1.3b5
    php pear 1.3b6
    php pear 1.4.0
    php pear 1.4.0 rc1
    php pear 1.4.0 rc2
    php pear 1.4.0a1
    php pear 1.4.0a10
    php pear 1.4.0a11
    php pear 1.4.0a12
    php pear 1.4.0a2
    php pear 1.4.0a3
    php pear 1.4.0a4
    php pear 1.4.0a5
    php pear 1.4.0a6
    php pear 1.4.0a7
    php pear 1.4.0a8
    php pear 1.4.0a9
    php pear 1.4.1
    php pear 1.4.2