Executive Summary

Informations
Name CVE-2009-4143 First vendor Publication 2009-12-21
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12607
 
Oval ID: oval:org.mitre.oval:def:12607
Title: USN-882-1 -- php5 vulnerabilities
Description: Maksymilian Arciemowicz discovered that PHP did not properly handle the ini_restore function. An attacker could exploit this issue to obtain random memory contents or to cause the PHP server to crash, resulting in a denial of service. It was discovered that the htmlspecialchars function did not properly handle certain character sequences, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. Stefan Esser discovered that PHP did not properly handle session data. An attacker could exploit this issue to bypass safe_mode or open_basedir restrictions
Family: unix Class: patch
Reference(s): USN-882-1
CVE-2009-2626
CVE-2009-4142
CVE-2009-4143
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 8.10
Ubuntu 9.10
Ubuntu 6.06
Ubuntu 9.04
Product(s): php5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13461
 
Oval ID: oval:org.mitre.oval:def:13461
Title: DSA-2001-1 php5 -- multiple
Description: Several remote vulnerabilities have been discovered in PHP 5, an hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4142 The htmlspecialchars function does not properly handle invalid multi-byte sequences. CVE-2009-4143 Memory corruption via session interruption. In the stable distribution, this update also includes bug fixes that were to be included in a stable point release as version 5.2.6.dfsg.1-1+lenny5. For the stable distribution, these problems have been fixed in version 5.2.6.dfsg.1-1+lenny6. For the testing distribution and the unstable distribution, these problems have been fixed in version 5.2.12.dfsg.1-1. We recommend that you upgrade your php5 packages.
Family: unix Class: patch
Reference(s): DSA-2001-1
CVE-2009-4142
CVE-2009-4143
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): php5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13556
 
Oval ID: oval:org.mitre.oval:def:13556
Title: DSA-2002-1 polipo -- denial of service
Description: Several denial of service vulnerabilities have been discovered in polipo, a small, caching web proxy. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-3305 A malicious remote sever could cause polipo to crash by sending an invalid Cache-Control header. CVE-2009-4143 A malicious client could cause polipo to crash by sending a large Content-Length value. This upgrade also fixes some other bugs that could lead to a daemon crash or an infinite loop and may be triggerable remotely. For the stable distribution, these problems have been fixed in version 1.0.4-1+lenny1. For the testing distribution and the unstable distribution, these problems have been fixed in version 1.0.4-3. We recommend that you upgrade your polipo packages.
Family: unix Class: patch
Reference(s): DSA-2002-1
CVE-2009-3305
CVE-2009-4413
CVE-2009-4143
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): polipo
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7367
 
Oval ID: oval:org.mitre.oval:def:7367
Title: DSA-2001 php5 -- multiple vulnerabilities
Description: Several remote vulnerabilities have been discovered in PHP 5, an hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems: The htmlspecialchars function does not properly handle invalid multi-byte sequences. Memory corruption via session interruption. In the stable distribution , this update also includes bug fixes that were to be included in a stable point release as version 5.2.6.dfsg.1-1+lenny5.
Family: unix Class: patch
Reference(s): DSA-2001
CVE-2009-4142
CVE-2009-4143
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): php5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7439
 
Oval ID: oval:org.mitre.oval:def:7439
Title: HP-UX Running Apache with PHP, Remote Denial of Service (DoS), Unauthorized Access, Privileged Access, Cross Site Scripting (XSS)
Description: PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
Family: unix Class: vulnerability
Reference(s): CVE-2009-4143
Version: 11
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7445
 
Oval ID: oval:org.mitre.oval:def:7445
Title: DSA-2002 polipo -- denial of service
Description: Several denial of service vulnerabilities have been discovered in polipo, a small, caching web proxy. The Common Vulnerabilities and Exposures project identifies the following problems: A malicous remote sever could cause polipo to crash by sending an invalid Cache-Control header. A malicous client could cause polipo to crash by sending a large Content-Length value. This upgrade also fixes some other bugs that could lead to a daemon crash or an infinite loop and may be triggerable remotely.
Family: unix Class: patch
Reference(s): DSA-2002
CVE-2009-3305
CVE-2009-4413
CVE-2009-4143
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): polipo
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 325

OpenVAS Exploits

Date Description
2010-06-23 Name : HP-UX Update for Apache with PHP HPSBUX02543
File : nvt/gb_hp_ux_HPSBUX02543.nasl
2010-05-12 Name : Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002
File : nvt/macosx_upd_10_6_3_secupd_2010-002.nasl
2010-03-02 Name : Mandriva Update for php MDVSA-2010:045 (php)
File : nvt/gb_mandriva_MDVSA_2010_045.nasl
2010-01-29 Name : Mandriva Update for urpmi MDVA-2010:045 (urpmi)
File : nvt/gb_mandriva_MDVA_2010_045.nasl
2010-01-19 Name : Ubuntu Update for php5 vulnerabilities USN-882-1
File : nvt/gb_ubuntu_USN_882_1.nasl
2010-01-07 Name : Gentoo Security Advisory GLSA 201001-03 (php)
File : nvt/glsa_201001_03.nasl
2009-12-30 Name : FreeBSD Ports: php5
File : nvt/freebsd_php56.nasl
2009-12-18 Name : PHP < 5.2.12 Multiple Vulnerabilities
File : nvt/php_dec_2009.nasl
0000-00-00 Name : Slackware Advisory SSA:2010-024-02 php
File : nvt/esoft_slk_ssa_2010_024_02.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
61208 PHP $_SESSION Interrupt Corruption Unspecified Issue

Nessus® Vulnerability Scanner

Date Description
2010-09-17 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_6_2_0_12.nasl - Type : ACT_GATHER_INFO
2010-03-29 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_SecUpd2010-002.nasl - Type : ACT_GATHER_INFO
2010-02-25 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201001-03.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2001.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2002.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-045.nasl - Type : ACT_GATHER_INFO
2010-01-25 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2010-024-02.nasl - Type : ACT_GATHER_INFO
2010-01-14 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-882-1.nasl - Type : ACT_GATHER_INFO
2009-12-18 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_39a25a63eb5c11deb65000215c6a37bb.nasl - Type : ACT_GATHER_INFO
2009-12-18 Name : The remote web server uses a version of PHP that is affected by multiple flaws.
File : php_5_2_12.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
BID http://www.securityfocus.com/bid/37390
CONFIRM http://support.apple.com/kb/HT4077
http://www.php.net/ChangeLog-5.php
http://www.php.net/releases/5_2_12.php
DEBIAN http://www.debian.org/security/2010/dsa-2001
HP http://marc.info/?l=bugtraq&m=127680701405735&w=2
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:045
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECUNIA http://secunia.com/advisories/37821
http://secunia.com/advisories/38648
http://secunia.com/advisories/40262
http://secunia.com/advisories/41480
http://secunia.com/advisories/41490
VUPEN http://www.vupen.com/english/advisories/2009/3593

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2024-02-02 01:12:00
  • Multiple Updates
2024-02-01 12:03:22
  • Multiple Updates
2023-09-05 12:11:18
  • Multiple Updates
2023-09-05 01:03:13
  • Multiple Updates
2023-09-02 12:11:21
  • Multiple Updates
2023-09-02 01:03:14
  • Multiple Updates
2023-08-12 12:13:20
  • Multiple Updates
2023-08-12 01:03:14
  • Multiple Updates
2023-08-11 12:11:24
  • Multiple Updates
2023-08-11 01:03:21
  • Multiple Updates
2023-08-06 12:10:57
  • Multiple Updates
2023-08-06 01:03:15
  • Multiple Updates
2023-08-04 12:11:02
  • Multiple Updates
2023-08-04 01:03:17
  • Multiple Updates
2023-07-14 12:10:59
  • Multiple Updates
2023-07-14 01:03:15
  • Multiple Updates
2023-03-29 01:12:35
  • Multiple Updates
2023-03-28 12:03:21
  • Multiple Updates
2022-10-11 12:09:47
  • Multiple Updates
2022-10-11 01:03:03
  • Multiple Updates
2021-05-04 12:10:33
  • Multiple Updates
2021-04-22 01:11:01
  • Multiple Updates
2020-05-23 01:41:09
  • Multiple Updates
2020-05-23 00:24:40
  • Multiple Updates
2019-06-08 12:03:01
  • Multiple Updates
2018-10-31 00:20:00
  • Multiple Updates
2018-10-04 12:05:29
  • Multiple Updates
2017-09-19 09:23:31
  • Multiple Updates
2016-10-29 01:00:44
  • Multiple Updates
2016-06-28 17:54:49
  • Multiple Updates
2016-04-26 19:17:22
  • Multiple Updates
2014-02-17 10:52:32
  • Multiple Updates
2013-05-11 00:01:45
  • Multiple Updates