CVE-2011-1398
Published: 30 August 2012
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
Notes
Author | Note |
---|---|
tyhicks | Incomplete fix is tracked as CVE-2012-4388 |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
hardy |
Released
(5.2.4-2ubuntu5.26)
|
lucid |
Released
(5.3.2-1ubuntu4.18)
|
|
natty |
Released
(5.3.5-1ubuntu7.11)
|
|
oneiric |
Released
(5.3.6-13ubuntu3.9)
|
|
precise |
Released
(5.3.10-1ubuntu3.4)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=318820 upstream: http://svn.php.net/viewvc?view=revision&revision=318997 upstream: http://git.php.net/?p=php-src.git;a=commit;h=61088ce7296f2a3b4b53e60bdf413455b870664d upstream: http://svn.php.net/viewvc?view=revision&revision=323033 upstream: http://svn.php.net/viewvc?view=revision&revision=323043 upstream: http://svn.php.net/viewvc?view=revision&revision=323986 upstream: http://git.php.net/?p=php-src.git;a=commit;h=8e82bda330264d290a5e55580eea2eb875d4cb69 upstream: http://git.php.net/?p=php-src.git;a=commit;h=ca58cd01fc329f907a13b82370427715d9c5bf70 upstream: http://git.php.net/?p=php-src.git;a=commit;h=daa190f8fd5441b077bfd5ae8e999596a8c34dd3 |