CVE-2002-0985

Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*

History

13 Feb 2024, 18:00

Type Values Removed Values Added
CPE cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt - Broken Link
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 - Broken Link
References () http://marc.info/?l=bugtraq&m=103011916928204&w=2 - () http://marc.info/?l=bugtraq&m=103011916928204&w=2 - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=105760591228031&w=2 - () http://marc.info/?l=bugtraq&m=105760591228031&w=2 - Third Party Advisory
References () http://www.debian.org/security/2002/dsa-168 - Patch, Vendor Advisory () http://www.debian.org/security/2002/dsa-168 - Broken Link, Patch, Vendor Advisory
References () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 - () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 - Broken Link
References () http://www.novell.com/linux/security/advisories/2002_036_modphp4.html - () http://www.novell.com/linux/security/advisories/2002_036_modphp4.html - Broken Link
References () http://www.osvdb.org/2111 - () http://www.osvdb.org/2111 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-213.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-213.html - Broken Link, Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2002-214.html - () http://www.redhat.com/support/errata/RHSA-2002-214.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-243.html - () http://www.redhat.com/support/errata/RHSA-2002-243.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-244.html - () http://www.redhat.com/support/errata/RHSA-2002-244.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-248.html - () http://www.redhat.com/support/errata/RHSA-2002-248.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2003-159.html - () http://www.redhat.com/support/errata/RHSA-2003-159.html - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/9966 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/9966 - Third Party Advisory, VDB Entry
First Time Openpkg openpkg
Openpkg
CWE NVD-CWE-Other CWE-88

Information

Published : 2002-09-24 04:00

Updated : 2024-02-13 18:00


NVD link : CVE-2002-0985

Mitre link : CVE-2002-0985

CVE.ORG link : CVE-2002-0985


JSON object : View

Products Affected

php

  • php

openpkg

  • openpkg
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')