Vulnerabilities > CVE-2002-0081 - Unspecified vulnerability in PHP

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
php
nessus

Summary

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.

Vulnerable Configurations

Part Description Count
Application
Php
4

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-115.NASL
    descriptionStefan Esser, who is also a member of the PHP team, found several flawsin the way PHP handles multipart/form-data POST requests (as described in RFC1867) known as POST fileuploads. Each of the flaws could allow an attacker to execute arbitrary code on the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id14952
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14952
    titleDebian DSA-115-1 : php - broken boundary check and more
  • NASL familyWeb Servers
    NASL idPHP_SPLIT_MIME.NASL
    descriptionThe remote host is running a version of PHP earlier than 4.1.2. There are several flaws in how PHP handles multipart/form-data POST requests, any one of which could allow an attacker to gain remote access to the system.
    last seen2020-06-01
    modified2020-06-02
    plugin id10867
    published2002-02-28
    reporterThis script is Copyright (C) 2002-2018 Thomas Reinke
    sourcehttps://www.tenable.com/plugins/nessus/10867
    titlePHP mime_split Function POST Request Overflow
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2002-017.NASL
    descriptionSeveral flaws exist in various versions of PHP in the way it handles multipart/form-data POST requests, which are used for file uploads. The php_mime_split() function could be used by an attacker to execute arbitrary code on the server. This affects both PHP4 and PHP3. The authors have fixed this in PHP 4.1.2 and provided patches for older versions of PHP.
    last seen2020-06-01
    modified2020-06-02
    plugin id13925
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13925
    titleMandrake Linux Security Advisory : php (MDKSA-2002:017)

Redhat

advisories
  • rhsa
    idRHSA-2002:035
  • rhsa
    idRHSA-2002:040