Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-1130

Published: 26 March 2010

session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

Notes

AuthorNote
mdeslaur
actually fixed in 5.3.2
open_basedir and safe_mode issue
dapper doesn't try and strip ; chars, so not vulnerable

Priority

Low

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
dapper Not vulnerable
(5.1.2-1ubuntu3.18)
hardy
Released (5.2.4-2ubuntu5.12)
intrepid Ignored
(end of life, was needed)
jaunty
Released (5.2.6.dfsg.1-3ubuntu4.6)
karmic
Released (5.2.10.dfsg.1-2ubuntu6.5)
lucid Not vulnerable
(5.3.2-1ubuntu3)
upstream
Released (5.2.13, 5.3.2)
Patches:
upstream: http://svn.php.net/viewvc?view=revision&revision=294272