CVE-2014-0185

sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

16 Aug 2022, 13:32

Type Values Removed Values Added
CWE CWE-264 CWE-269
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-10/msg00012.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2015-10/msg00012.html - Mailing List, Third Party Advisory
References (CONFIRM) https://bugs.php.net/bug.php?id=67060 - (CONFIRM) https://bugs.php.net/bug.php?id=67060 - Vendor Advisory
References (CONFIRM) http://www.php.net/archive/2014.php#id2014-05-01-1 - (CONFIRM) http://www.php.net/archive/2014.php#id2014-05-01-1 - Vendor Advisory
References (CONFIRM) http://support.apple.com/kb/HT6443 - (CONFIRM) http://support.apple.com/kb/HT6443 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59329 - (SECUNIA) http://secunia.com/advisories/59329 - Third Party Advisory
References (MISC) https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch - Patch (MISC) https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch - Patch, Third Party Advisory
References (CONFIRM) http://www.php.net/ChangeLog-5.php - (CONFIRM) http://www.php.net/ChangeLog-5.php - Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/59061 - (SECUNIA) http://secunia.com/advisories/59061 - Third Party Advisory
References (CONFIRM) https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d - Exploit, Patch (CONFIRM) https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1307027 - (CONFIRM) https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1307027 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2014/04/29/5 - (MLIST) http://www.openwall.com/lists/oss-security/2014/04/29/5 - Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1092815 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1092815 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Information

Published : 2014-05-06 10:44

Updated : 2023-12-10 11:31


NVD link : CVE-2014-0185

Mitre link : CVE-2014-0185

CVE.ORG link : CVE-2014-0185


JSON object : View

Products Affected

php

  • php
CWE
CWE-269

Improper Privilege Management