CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
15.7%
Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 4.0.0 | cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* |
php | php | 4.0.2 | cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* |
php | php | 4.0.3 | cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* |
php | php | 4.0.4 | cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* |
php | php | 4.0.5 | cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* |
php | php | 4.1.0 | cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:* |
php | php | 4.1.1 | cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:* |
php | php | 4.1.2 | cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:* |
php | php | 4.2.0 | cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/fulldisclosure/2006-06/0209.html
cvs.php.net/viewcvs.cgi/php-src/NEWS?view=markup&rev=1.1247.2.920.2.134
secunia.com/advisories/21125
securityreason.com/securityalert/1069
securitytracker.com/id?1016271
www.mandriva.com/security/advisories?name=MDKSA-2006:122
www.securityfocus.com/archive/1/436785/100/0/threaded
www.ubuntu.com/usn/usn-320-1
exchange.xforce.ibmcloud.com/vulnerabilities/27049