Vulnerability Name:

CVE-2008-2829 (CCN-43357)

Assigned:2008-06-19
Published:2008-06-19
Updated:2019-10-09
Summary:php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MISC
Type: Vendor Advisory
http://bugs.php.net/bug.php?id=42862

Source: MITRE
Type: CNA
CVE-2008-2829

Source: CCN
Type: HP Security Bulletin HPSBUX02431 SSRT090085 rev.1
HP-UX Running Apache Web Server Suite, Remote Denial of Service (DoS), Execution of Arbitrary Code

Source: APPLE
Type: Mailing List, Third Party Advisory
APPLE-SA-2009-05-12

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2008:027

Source: HP
Type: Mailing List, Third Party Advisory
SSRT090085

Source: HP
Type: Mailing List, Third Party Advisory
HPSBUX02465

Source: OSVDB
Type: Broken Link
46641

Source: SECUNIA
Type: Third Party Advisory
31200

Source: SECUNIA
Type: Third Party Advisory
32746

Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
35074

Source: SECUNIA
Type: Third Party Advisory
35306

Source: CCN
Type: SA35650
HP-UX Apache Web Server Suite Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
35650

Source: GENTOO
Type: Third Party Advisory
GLSA-200811-05

Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-002 / Mac OS X v10.5.7

Source: CONFIRM
Type: Third Party Advisory
http://support.apple.com/kb/HT3549

Source: CCN
Type: ASA-2009-255
HPSBUX02431 SSRT090085 rev.1 - HP-UX Running Apache Web Server SuiteRemote Denial of Service (DoS) Execution of Arbitrary Code

Source: CONFIRM
Type: Broken Link
http://wiki.rpath.com/Advisories:rPSA-2009-0035

Source: CCN
Type: GLSA-200811-05
PHP: Multiple vulnerabilities

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:126

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:127

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:128

Source: CCN
Type: oss-security Mailing List, Thu, 19 Jun 2008 18:37:54 +0200
CVE request: php 5.2.6 ext/imap buffer overflows

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20080619 CVE request: php 5.2.6 ext/imap buffer overflows

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20080624 Re: CVE request: php 5.2.6 ext/imap buffer overflows

Source: CCN
Type: OSVDB ID: 46641
PHP php_imap.c Obsolete API Crafted IMAP Request Overflow DoS

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl

Source: BID
Type: Patch, Third Party Advisory, VDB Entry
29829

Source: CCN
Type: BID-29829
PHP 'rfc822_write_address()' Function Buffer Overflow Vulnerability

Source: CCN
Type: TLSA-2008-27
Multiple vulnerabilities exist in php

Source: CCN
Type: USN-628-1
PHP vulnerabilities

Source: UBUNTU
Type: Third Party Advisory
USN-628-1

Source: CERT
Type: Third Party Advisory, US Government Resource
TA09-133A

Source: VUPEN
Type: Patch, Third Party Advisory
ADV-2009-1297

Source: CCN
Type: Gentoo Bugzilla Bug 221969
dev-lang/php uses insecure c-client calls resulting in buffer overflows (CVE-2008-2829)

Source: CONFIRM
Type: Third Party Advisory
https://bugs.gentoo.org/show_bug.cgi?id=221969

Source: XF
Type: Third Party Advisory, VDB Entry
php-phpimap-dos(43357)

Source: XF
Type: UNKNOWN
php-phpimap-dos(43357)

Source: FEDORA
Type: Third Party Advisory
FEDORA-2009-3768

Source: FEDORA
Type: Third Party Advisory
FEDORA-2009-3848

Source: SUSE
Type: SUSE-SR:2008:027
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 4.4.9)
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.0.59:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:5.5.27:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082829
    V
    CVE-2008-2829
    2022-05-20
    oval:org.opensuse.security:def:31224
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-07-21
    oval:org.opensuse.security:def:42077
    P
    Security update for curl (Moderate)
    2021-05-26
    oval:org.opensuse.security:def:31150
    P
    Security update for xorg-x11-server (Important)
    2021-04-14
    oval:org.opensuse.security:def:31748
    P
    Security update for openssl (Moderate)
    2021-03-24
    oval:org.opensuse.security:def:31356
    P
    Security update for python (Moderate)
    2021-03-16
    oval:org.opensuse.security:def:35670
    P
    apache2-mod_php5-5.2.14-0.7.24.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31804
    P
    Security update for ant (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25563
    P
    Security update for xrdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:26670
    P
    apache2-mod_php5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31892
    P
    Security update for expat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25798
    P
    Security update for flash-player (Critical)
    2020-12-01
    oval:org.opensuse.security:def:25222
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:31958
    P
    Security update for gtk2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25900
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31505
    P
    Security update for python27 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25297
    P
    Security update for libX11 (Important)
    2020-12-01
    oval:org.opensuse.security:def:32635
    P
    apache2-mod_php5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25953
    P
    Security update for gcc48 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25506
    P
    Security update for openexr (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31139
    P
    Security update for less (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26635
    P
    quagga on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31853
    P
    Security update for coreutils (Important)
    2020-12-01
    oval:org.opensuse.security:def:25647
    P
    Security update for freetype2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25221
    P
    Security update for sysstat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31914
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25851
    P
    Security update for freerdp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31448
    P
    Security update for postgresql-init (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25233
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32596
    P
    postgresql on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25939
    P
    Security update for gstreamer-0_10-plugins-base (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31592
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25425
    P
    Security update for bluez (Important)
    2020-12-01
    oval:org.opensuse.security:def:31138
    P
    Security update for lcms
    2020-12-01
    oval:org.opensuse.security:def:25997
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.mitre.oval:def:17737
    P
    USN-628-1 -- php5 vulnerabilities
    2014-06-30
    BACK
    php php *
    php php 5.2.5
    php php 5.2.6
    canonical ubuntu linux 6.06
    canonical ubuntu linux 7.04
    canonical ubuntu linux 7.10
    canonical ubuntu linux 8.04
    apple mac os x 10.5
    apple mac os x server 10.5
    apple mac os x 10.5.1
    apple mac os x server 10.5.1
    apple mac os x 10.5.2
    apple mac os x server 10.5.2
    php php 4.0.0
    php php 5.2.5
    php php 5.2.6
    apple mac os x server 10.5.3
    apple mac os x 10.5.3
    apple mac os x 10.5.4
    apple mac os x server 10.5.4
    apple mac os x 10.5.5
    apple mac os x server 10.5.5
    apple mac os x 10.5.6
    apple mac os x server 10.5.6
    gentoo linux *
    hp hp-ux b.11.11
    hp hp-ux b.11.23
    canonical ubuntu 6.06
    turbolinux turbolinux personal *
    turbolinux turbolinux multimedia *
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    canonical ubuntu 7.04
    hp hp-ux b.11.31
    apache http server 2.0.59
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04
    apache http server 2.2.8
    apache tomcat 5.5.27