CVE-2002-0986

The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."
References
Link Resource
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545
http://marc.info/?l=bugtraq&m=103011916928204&w=2
http://marc.info/?l=bugtraq&m=105760591228031&w=2
http://www.debian.org/security/2002/dsa-168
http://www.kb.cert.org/vuls/id/410609 US Government Resource
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082
http://www.novell.com/linux/security/advisories/2002_036_modphp4.html
http://www.osvdb.org/2160
http://www.redhat.com/support/errata/RHSA-2002-213.html
http://www.redhat.com/support/errata/RHSA-2002-214.html
http://www.redhat.com/support/errata/RHSA-2002-243.html
http://www.redhat.com/support/errata/RHSA-2002-244.html
http://www.redhat.com/support/errata/RHSA-2002-248.html
http://www.redhat.com/support/errata/RHSA-2003-159.html
http://www.securityfocus.com/bid/5562 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9959
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545
http://marc.info/?l=bugtraq&m=103011916928204&w=2
http://marc.info/?l=bugtraq&m=105760591228031&w=2
http://www.debian.org/security/2002/dsa-168
http://www.kb.cert.org/vuls/id/410609 US Government Resource
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082
http://www.novell.com/linux/security/advisories/2002_036_modphp4.html
http://www.osvdb.org/2160
http://www.redhat.com/support/errata/RHSA-2002-213.html
http://www.redhat.com/support/errata/RHSA-2002-214.html
http://www.redhat.com/support/errata/RHSA-2002-243.html
http://www.redhat.com/support/errata/RHSA-2002-244.html
http://www.redhat.com/support/errata/RHSA-2002-248.html
http://www.redhat.com/support/errata/RHSA-2003-159.html
http://www.securityfocus.com/bid/5562 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9959
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:40

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 -
References () http://marc.info/?l=bugtraq&m=103011916928204&w=2 - () http://marc.info/?l=bugtraq&m=103011916928204&w=2 -
References () http://marc.info/?l=bugtraq&m=105760591228031&w=2 - () http://marc.info/?l=bugtraq&m=105760591228031&w=2 -
References () http://www.debian.org/security/2002/dsa-168 - () http://www.debian.org/security/2002/dsa-168 -
References () http://www.kb.cert.org/vuls/id/410609 - US Government Resource () http://www.kb.cert.org/vuls/id/410609 - US Government Resource
References () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 - () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 -
References () http://www.novell.com/linux/security/advisories/2002_036_modphp4.html - () http://www.novell.com/linux/security/advisories/2002_036_modphp4.html -
References () http://www.osvdb.org/2160 - () http://www.osvdb.org/2160 -
References () http://www.redhat.com/support/errata/RHSA-2002-213.html - () http://www.redhat.com/support/errata/RHSA-2002-213.html -
References () http://www.redhat.com/support/errata/RHSA-2002-214.html - () http://www.redhat.com/support/errata/RHSA-2002-214.html -
References () http://www.redhat.com/support/errata/RHSA-2002-243.html - () http://www.redhat.com/support/errata/RHSA-2002-243.html -
References () http://www.redhat.com/support/errata/RHSA-2002-244.html - () http://www.redhat.com/support/errata/RHSA-2002-244.html -
References () http://www.redhat.com/support/errata/RHSA-2002-248.html - () http://www.redhat.com/support/errata/RHSA-2002-248.html -
References () http://www.redhat.com/support/errata/RHSA-2003-159.html - () http://www.redhat.com/support/errata/RHSA-2003-159.html -
References () http://www.securityfocus.com/bid/5562 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/5562 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/9959 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/9959 -

Information

Published : 2002-09-24 04:00

Updated : 2024-11-20 23:40


NVD link : CVE-2002-0986

Mitre link : CVE-2002-0986

CVE.ORG link : CVE-2002-0986


JSON object : View

Products Affected

php

  • php