SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP SQLite Bug Lets Users Bypass open_basedir Restrictions
SecurityTracker Alert ID:  1027286
SecurityTracker URL:  http://securitytracker.com/id/1027286
CVE Reference:   CVE-2012-3365   (Links to External Site)
Date:  Jul 20 2012
Impact:   Not specified
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.3.15
Description:   A vulnerability was reported in PHP. A remote or local user can bypass security restrictions.

A user can exploit an unspecified flaw in SQLite to bypass the open_basedir restrictions.

Impact:   A user can bypass the open_basedir restrictions.
Solution:   The vendor has issued a fix (5.3.15).

The vendor's advisory is available at:

http://www.php.net/ChangeLog-5.php#5.3.15

Vendor URL:  www.php.net/ (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 3 2014 (Oracle Issues Fix for Solaris) PHP SQLite Bug Lets Users Bypass open_basedir Restrictions
Oracle has issued a fix for Solaris 11.1.
Jul 13 2017 (Juniper Issues Fix for Juniper Junos J-Web) PHP SQLite Bug Lets Users Bypass open_basedir Restrictions
Juniper has issued a fix for Juniper Junos J-Web.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC