CVE-2004-1019

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
http://marc.info/?l=bugtraq&m=110314318531298&w=2
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
http://www.hardened-php.net/advisories/012004.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.php.net/release_4_3_10.php
http://www.redhat.com/support/errata/RHSA-2004-687.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.securityfocus.com/advisories/9028
https://bugzilla.fedora.us/show_bug.cgi?id=2344
https://exchange.xforce.ibmcloud.com/vulnerabilities/18514
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
http://marc.info/?l=bugtraq&m=110314318531298&w=2
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
http://www.hardened-php.net/advisories/012004.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.php.net/release_4_3_10.php
http://www.redhat.com/support/errata/RHSA-2004-687.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.securityfocus.com/advisories/9028
https://bugzilla.fedora.us/show_bug.cgi?id=2344
https://exchange.xforce.ibmcloud.com/vulnerabilities/18514
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html - () http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html -
References () http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html - () http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html -
References () http://marc.info/?l=bugtraq&m=110314318531298&w=2 - () http://marc.info/?l=bugtraq&m=110314318531298&w=2 -
References () http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html - () http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html -
References () http://www.hardened-php.net/advisories/012004.txt - () http://www.hardened-php.net/advisories/012004.txt -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:151 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:151 -
References () http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html - () http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html -
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -
References () http://www.php.net/release_4_3_10.php - () http://www.php.net/release_4_3_10.php -
References () http://www.redhat.com/support/errata/RHSA-2004-687.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-687.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-032.html - () http://www.redhat.com/support/errata/RHSA-2005-032.html -
References () http://www.redhat.com/support/errata/RHSA-2005-816.html - () http://www.redhat.com/support/errata/RHSA-2005-816.html -
References () http://www.securityfocus.com/advisories/9028 - () http://www.securityfocus.com/advisories/9028 -
References () https://bugzilla.fedora.us/show_bug.cgi?id=2344 - () https://bugzilla.fedora.us/show_bug.cgi?id=2344 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18514 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18514 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511 -

Information

Published : 2005-01-10 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-1019

Mitre link : CVE-2004-1019

CVE.ORG link : CVE-2004-1019


JSON object : View

Products Affected

openpkg

  • openpkg

ubuntu

  • ubuntu_linux

trustix

  • secure_linux

php

  • php
CWE
CWE-20

Improper Input Validation