Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-2336

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2012-2336
Last Modified 23 Jul 2013 05:39:24
Published 11 May 2012 06:15:48
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2012-2336

Summary

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

Vulnerable Systems

Application

  • Php 1.0

  • Php 2.0

  • Php 2.0b10

  • Php 3.0

  • Php 3.0.1

  • Php 3.0.10

  • Php 3.0.11

  • Php 3.0.12

  • Php 3.0.13

  • Php 3.0.14

  • Php 3.0.15

  • Php 3.0.16

  • Php 3.0.17

  • Php 3.0.18

  • Php 3.0.2

  • Php 3.0.3

  • Php 3.0.4

  • Php 3.0.5

  • Php 3.0.6

  • Php 3.0.7

  • Php 3.0.8

  • Php 3.0.9

  • Php 4.0

  • Php 4.0.0

  • Php 4.0.1

  • Php 4.0.2

  • Php 4.0.3

  • Php 4.0.4

  • Php 4.0.5

  • Php 4.0.6

  • Php 4.0.7

  • Php 4.1.0

  • Php 4.1.1

  • Php 4.1.2

  • Php 4.2.0

  • Php 4.2.1

  • Php 4.2.2

  • Php 4.2.3

  • Php 4.3.0

  • Php 4.3.1

  • Php 4.3.10

  • Php 4.3.11

  • Php 4.3.2

  • Php 4.3.3

  • Php 4.3.4

  • Php 4.3.5

  • Php 4.3.6

  • Php 4.3.7

  • Php 4.3.8

  • Php 4.3.9

  • Php 4.4.0

  • Php 4.4.1

  • Php 4.4.2

  • Php 4.4.3

  • Php 4.4.4

  • Php 4.4.5

  • Php 4.4.6

  • Php 4.4.7

  • Php 4.4.8

  • Php 4.4.9

  • Php 5.0.0

  • Php 5.0.1

  • Php 5.0.2

  • Php 5.0.3

  • Php 5.0.4

  • Php 5.0.5

  • Php 5.1.0

  • Php 5.1.1

  • Php 5.1.2

  • Php 5.1.3

  • Php 5.1.4

  • Php 5.1.5

  • Php 5.1.6

  • Php 5.2.0

  • Php 5.2.1

  • Php 5.2.10

  • Php 5.2.11

  • Php 5.2.12

  • Php 5.2.13

  • Php 5.2.14

  • Php 5.2.15

  • Php 5.2.16

  • Php 5.2.17

  • Php 5.2.2

  • Php 5.2.3

  • Php 5.2.4

  • Php 5.2.5

  • Php 5.2.6

  • Php 5.2.7

  • Php 5.2.8

  • Php 5.2.9

  • Php 5.3.0

  • Php 5.3.1

  • Php 5.3.10

  • Php 5.3.11

  • Php 5.3.12

  • Php 5.3.13

  • Php 5.3.2

  • Php 5.3.3

  • Php 5.3.4

  • Php 5.3.5

  • Php 5.3.6

  • Php 5.3.7

  • Php 5.3.8

  • Php 5.3.9

  • Php 5.4.0

  • Php 5.4.1

  • Php 5.4.2


References

CONFIRM - https://bugs.php.net/patch-display.php?bug_id=61910&patch=CVE-2012-1823.patch&revision=1336251592&display=1

CONFIRM - https://bugs.php.net/bug.php?id=61910

CONFIRM - http://www.php.net/ChangeLog-5.php#5.4.3

CONFIRM - http://www.php.net/archive/2012.php#id2012-05-08-1

SECUNIA - 49014

SUSE - SUSE-SU-2012:0840

HP - HPSBMU02900

HP - SSRT100992

Related Patches

Red Hat 2012:1045-01 RHSA Moderate: php security update for RHEL 5 x86

Red Hat 2012:1045-01 RHSA Moderate: php security update for RHEL 5 x86_64

Red Hat 2012:1047-01 RHSA Moderate: php53 security update for RHEL 5 x86

Red Hat 2012:1047-01 RHSA Moderate: php53 security update for RHEL 5 x86_64

Novell SUSE 2012:6316 apache2-mod_php5 security update for SLES 11 SP1 i586

Novell SUSE 2012:6316 apache2-mod_php5 security update for SLES 11 SP1 x86_64

Novell SUSE 2012:6440 apache2-mod_php53 security update for SLES 11 SP2 i586

Novell SUSE 2012:6440 apache2-mod_php53 security update for SLES 11 SP2 x86_64

Novell SUSE 2012:8133 apache2-mod_php5 security update for SLES 10 SP4 i586

Novell SUSE 2012:8133 apache2-mod_php5 security update for SLES 10 SP4 x86_64


Last Updated: 27 May 2016 10:55:08