CVE-2002-0081

Current Description

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.

Basic Data

PublishedMarch 08, 2002
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPhpPhp3.0*******
    2.3ApplicationPhpPhp4.0.6*******
    2.3ApplicationPhpPhp4.1.0*******
    2.3ApplicationPhpPhp4.1.1*******

Vulnerable Software List

VendorProductVersions
Php Php 3.0, 4.0.6, 4.1.0, 4.1.1

References

NameSourceURLTags
CLA-2002:468http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468CONECTIVA
20020227 Advisory 012002: PHP remote vulnerabilitieshttp://marc.info/?l=bugtraq&m=101484705523351&w=2BUGTRAQ
20020228 TSLSA-2002-0033 - mod_phphttp://marc.info/?l=bugtraq&m=101497256024338&w=2BUGTRAQ
20020304 Apache+php Proof of Concept Exploithttp://marc.info/?l=bugtraq&m=101537076619812&w=2BUGTRAQ
20020227 PHP remote vulnerabilitieshttp://marc.info/?l=ntbugtraq&m=101484975231922&w=2NTBUGTRAQ
20020225 Re: Rumours about Apache 1.3.22 exploitshttp://marc.info/?l=vuln-dev&m=101468694824998&w=2VULN-DEV
HPSBTL0203-028http://online.securityfocus.com/advisories/3911HP
http://security.e-matters.de/advisories/012002.htmlhttp://security.e-matters.de/advisories/012002.htmlMISCVendor Advisory
CA-2002-05http://www.cert.org/advisories/CA-2002-05.htmlCERTUS Government Resource
DSA-115http://www.debian.org/security/2002/dsa-115DEBIAN
php-file-upload-overflow(8281)http://www.iss.net/security_center/static/8281.phpXF
VU#297363http://www.kb.cert.org/vuls/id/297363CERT-VNUS Government Resource
MDKSA-2002:017http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-017.phpMANDRAKE
ESA-20020301-006http://www.linuxsecurity.com/advisories/other_advisory-1924.htmlENGARDE
SuSE-SA:2002:007http://www.novell.com/linux/security/advisories/2002_007_mod_php4_txt.htmlSUSE
http://www.php.net/downloads.phphttp://www.php.net/downloads.phpCONFIRMPatch
RHSA-2002:035http://www.redhat.com/support/errata/RHSA-2002-035.htmlREDHAT
RHSA-2002:040http://www.redhat.com/support/errata/RHSA-2002-040.htmlREDHAT
4183http://www.securityfocus.com/bid/4183BID