Vulnerability Name:
CVE-2009-4143 (CCN-54914)
Assigned:
2009-11-27
Published:
2009-11-27
Updated:
2018-10-30
Summary:
PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
CVSS v3 Severity:
7.3 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
10.0 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.4 High
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
6.8 Medium
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
)
5.0 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Other
References:
Source: MITRE
Type: CNA
CVE-2009-4143
Source: CCN
Type: HP Security Bulletin HPSBMA02568 SSRT100219
HP System Management Homepage (SMH) for Linux and Windows, Remote Cross Site Scripting (XSS), HTTP Response Splitting, and Other Vulnerabilities
Source: APPLE
Type: UNKNOWN
APPLE-SA-2010-03-29-1
Source: HP
Type: UNKNOWN
SSRT100152
Source: CCN
Type: SA37821
PHP Multiple Vulnerabilities
Source: SECUNIA
Type: Vendor Advisory
37821
Source: SECUNIA
Type: Vendor Advisory
38648
Source: SECUNIA
Type: Vendor Advisory
40262
Source: CCN
Type: SA41480
HP System Management Homepage Multiple Vulnerabilities
Source: SECUNIA
Type: Vendor Advisory
41480
Source: CCN
Type: SA41490
HP System Management Homepage Multiple Vulnerabilities
Source: SECUNIA
Type: Vendor Advisory
41490
Source: CCN
Type: Apple Web site
About the security content of Security Update 2010-002 / Mac OS X v10.6.3
Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT4077
Source: DEBIAN
Type: UNKNOWN
DSA-2001
Source: DEBIAN
Type: DSA-2001
php5 -- multiple vulnerabilities
Source: DEBIAN
Type: DSA-2002
polipo -- denial of service
Source: CCN
Type: GLSA-201001-03
PHP: Multiple vulnerabilities
Source: HP
Type: UNKNOWN
SSRT100219
Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:045
Source: CCN
Type: OSVDB ID: 61208
PHP $_SESSION Interrupt Corruption Unspecified Issue
Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php
Source: CCN
Type: The PHP Group Web site
PHP 5.2.12 Release Announcement
Source: CONFIRM
Type: Vendor Advisory
http://www.php.net/releases/5_2_12.php
Source: BID
Type: UNKNOWN
37390
Source: CCN
Type: BID-37390
PHP 'session.save_path()' Arbitrary Code Execution Vulnerability
Source: CCN
Type: BID-43236
3Com OfficeConnect Gigabit VPN Firewall (3CREVF100-73) Cross Site Scripting Vulnerability
Source: CCN
Type: BID-43269
HP System Management Homepage Unspecified HTTP Response Splitting Vulnerability
Source: CCN
Type: USN-882-1
PHP vulnerabilities
Source: VUPEN
Type: Vendor Advisory
ADV-2009-3593
Source: XF
Type: UNKNOWN
php-sessionpath-code-execution(54914)
Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:7439
Vulnerable Configuration:
Configuration 1
:
cpe:/a:php:php:1.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0b10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:rc3:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:rc4:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.8:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0:rc3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:*:*:*:*:*:*:*:*
(Version <= 5.2.11)
Configuration CCN 1
:
cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
OR
cpe:/a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*
OR
cpe:/a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.mitre.oval:def:7439
V
HP-UX Running Apache with PHP, Remote Denial of Service (DoS), Unauthorized Access, Privileged Access, Cross Site Scripting (XSS)
2015-04-20
oval:org.mitre.oval:def:12607
P
USN-882-1 -- php5 vulnerabilities
2014-07-07
oval:org.mitre.oval:def:7367
P
DSA-2001 php5 -- multiple vulnerabilities
2014-06-23
oval:org.mitre.oval:def:13461
P
DSA-2001-1 php5 -- multiple
2014-06-23
oval:org.mitre.oval:def:13556
P
DSA-2002-1 polipo -- denial of service
2014-06-23
oval:org.mitre.oval:def:7445
P
DSA-2002 polipo -- denial of service
2014-06-23
oval:org.debian:def:2001
V
multiple vulnerabilities
2010-02-19
BACK
php
php 1.0
php
php 2.0
php
php 2.0b10
php
php 3.0
php
php 3.0.1
php
php 3.0.2
php
php 3.0.3
php
php 3.0.4
php
php 3.0.5
php
php 3.0.6
php
php 3.0.7
php
php 3.0.8
php
php 3.0.9
php
php 3.0.10
php
php 3.0.11
php
php 3.0.12
php
php 3.0.13
php
php 3.0.14
php
php 3.0.15
php
php 3.0.16
php
php 3.0.17
php
php 3.0.18
php
php 4
php
php 4.0
php
php 4.0 beta1
php
php 4.0 beta2
php
php 4.0 beta3
php
php 4.0 beta4
php
php 4.0 beta_4_patch1
php
php 4.0 rc1
php
php 4.0 rc2
php
php 4.0.0
php
php 4.0.1
php
php 4.0.2
php
php 4.0.3
php
php 4.0.4
php
php 4.0.5
php
php 4.0.6
php
php 4.0.7
php
php 4.0.7 rc1
php
php 4.0.7 rc2
php
php 4.0.7 rc3
php
php 4.0.7 rc4
php
php 4.1.0
php
php 4.1.1
php
php 4.1.2
php
php 4.2.0
php
php 4.2.1
php
php 4.2.2
php
php 4.2.3
php
php 4.3.0
php
php 4.3.1
php
php 4.3.2
php
php 4.3.3
php
php 4.3.4
php
php 4.3.5
php
php 4.3.6
php
php 4.3.7
php
php 4.3.8
php
php 4.3.9
php
php 4.3.10
php
php 4.3.11
php
php 4.4.0
php
php 4.4.1
php
php 4.4.2
php
php 4.4.3
php
php 4.4.4
php
php 4.4.5
php
php 4.4.6
php
php 4.4.7
php
php 4.4.8
php
php 4.4.9
php
php 5
php
php 5.0 rc1
php
php 5.0 rc2
php
php 5.0 rc3
php
php 5.0.0
php
php 5.0.0 beta1
php
php 5.0.0 beta2
php
php 5.0.0 beta3
php
php 5.0.0 beta4
php
php 5.0.0 rc1
php
php 5.0.0 rc2
php
php 5.0.0 rc3
php
php 5.0.1
php
php 5.0.2
php
php 5.0.3
php
php 5.0.4
php
php 5.0.5
php
php 5.1.0
php
php 5.1.1
php
php 5.1.2
php
php 5.1.3
php
php 5.1.4
php
php 5.1.5
php
php 5.1.6
php
php 5.2.0
php
php 5.2.1
php
php 5.2.2
php
php 5.2.3
php
php 5.2.4
php
php 5.2.5
php
php 5.2.6
php
php 5.2.7
php
php 5.2.8
php
php 5.2.9
php
php 5.2.10
php
php *
php
php 5.2.0
php
php 5.2.1
php
php 5.2.3
php
php 5.2.2
php
php 5.2.4
php
php 5.2.5
php
php 5.2.6
php
php 5.2.7
php
php 5.2.8
php
php 5.2.9
php
php 5.2.10
php
php 5.2.11
hp
system management homepage 6.0
hp
system management homepage 6.1
gentoo
linux *
canonical
ubuntu 6.06
mandrakesoft
mandrake linux corporate server 4.0
mandrakesoft
mandrake linux corporate server 4.0
mandrakesoft
mandrake linux 2008.0
mandrakesoft
mandrake linux 2008.0
canonical
ubuntu 8.04
mandriva
linux 2009.0
mandriva
linux 2009.0 -
debian
debian linux 5.0
mandriva
linux 2009.1
mandriva
linux 2009.1
apple
mac os x 10.5.8
apple
mac os x server 10.5.8
mandriva
enterprise server 5
mandriva
enterprise server 5