CVE-2008-7068
Published: 25 August 2009
The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.
Priority
Status
Package | Release | Status |
---|---|---|
php4 Launchpad, Ubuntu, Debian |
intrepid |
Does not exist
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
dapper |
Ignored
(end of life)
|
|
hardy |
Does not exist
|
|
upstream |
Needs triage
|
|
php5 Launchpad, Ubuntu, Debian |
dapper |
Released
(5.1.2-1ubuntu3.17)
|
hardy |
Released
(5.2.4-2ubuntu5.9)
|
|
intrepid |
Released
(5.2.6-2ubuntu4.5)
|
|
jaunty |
Not vulnerable
(5.2.6.dfsg.1-3ubuntu4.2)
|
|
karmic |
Not vulnerable
(5.2.10.dfsg.1-2ubuntu6.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://cvs.php.net/viewvc.cgi/php-src/ext/dba/libinifile/inifile.c?r1=1.14.2.1.2.4&r2=1.14.2.1.2.5 (5.2) upstream: http://cvs.php.net/viewvc.cgi/php-src/ext/dba/libinifile/inifile.c?r1=1.21&r2=1.22 (head) upstream: http://cvs.php.net/viewvc.cgi/php-src/ext/dba/libinifile/inifile.c?r1=1.14.2.1.2.3.2.1&r2=1.14.2.1.2.3.2.2 (5.3) |