CVE-2006-7243
Publication date 18 January 2011
Last updated 24 July 2024
Ubuntu priority
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Status
Package | Ubuntu Release | Status |
---|---|---|
php5 | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Fixed 5.3.3-1ubuntu9.4
|
|
10.04 LTS lucid |
Fixed 5.3.2-1ubuntu4.8
|
|
9.10 karmic |
Fixed 5.2.10.dfsg.1-2ubuntu6.9
|
|
8.04 LTS hardy | Ignored end of life | |
6.06 LTS dapper | Ignored end of life |
Notes
sbeattie
upstream only prepared a fix for the 5.3 tree. Backporting the fix to 5.2.x requires modifying php APIs.
Patch details
Package | Patch details |
---|---|
php5 |
References
Related Ubuntu Security Notices (USN)
- USN-1126-1
- PHP vulnerabilities
- 29 April 2011