Vulnerability Name:

CVE-2012-4388 (CCN-78586)

Assigned:2011-11-06
Published:2011-11-06
Updated:2023-02-13
Summary:
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: secalert@redhat.com
Type: Broken Link
secalert@redhat.com

Source: MITRE
Type: CNA
CVE-2012-4388

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: CCN
Type: oss-security Mailing List, Wed, 29 Aug 2012 13:26:34 -0500
php header() header injection detection bypass

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit, Patch, Vendor Advisory
secalert@redhat.com

Source: CCN
Type: BID-55527
PHP 'main/SAPI.c' CVE-2012-4388 HTTP Header Injection Vulnerability

Source: secalert@redhat.com
Type: Third Party Advisory, VDB Entry
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: PHP Bug #60227
header() cannot detect the multi-line header with CR(0x0D).

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: XF
Type: UNKNOWN
php-sapiheaderop-security-bypass(78586)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:php:php:5.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.0:rc2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20124388
    V
    CVE-2012-4388
    2017-09-27
    oval:org.mitre.oval:def:25781
    P
    SUSE-SU-2013:1315-1 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:17978
    P
    USN-1569-1 -- php5 vulnerabilities
    2014-07-21
    oval:com.ubuntu.precise:def:20124388000
    V
    CVE-2012-4388 on Ubuntu 12.04 LTS (precise) - medium.
    2012-09-07
    BACK
    php php 5.4.0
    php php 5.4.0 rc2