Upstream information

CVE-2006-1015 at MITRE

Description

Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.4
Vector AV:N/AC:L/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 154315 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • mod_php4 >= 4.2.2-503
  • mod_php4-core >= 4.2.2-503
  • mod_php4-devel >= 4.2.2-503
  • mod_php4-servlet >= 4.2.2-503
Builds
YOU Patch Nr: 10959
SUSE LINUX 10.0
  • apache2-mod_php5 >= 5.0.4-9.10
  • php5 >= 5.0.4-9.10
  • php5-exif >= 5.0.4-9.10
  • php5-fastcgi >= 5.0.4-9.10
  • php5-mbstring >= 5.0.4-9.10
  • php5-pear >= 5.0.4-9.10
  • php5-snmp >= 5.0.4-9.10
SUSE LINUX 9.3
  • apache2-mod_php4 >= 4.3.10-14.20
  • mod_php4-servlet >= 4.3.10-14.20
  • php4 >= 4.3.10-14.20
  • php4-32bit >= 9.3-7.9
  • php4-devel >= 4.3.10-14.20
  • php4-exif >= 4.3.10-14.20
  • php4-fastcgi >= 4.3.10-14.20
  • php4-mbstring >= 4.3.10-14.20
  • php4-pear >= 4.3.10-14.20
  • php4-session >= 4.3.10-14.20
  • php4-sysvshm >= 4.3.10-14.20
SUSE LINUX 10.0
  • apache2-mod_php4 >= 4.4.0-6.10
  • php4 >= 4.4.0-6.10
  • php4-32bit >= 4.4.0-6.10
  • php4-64bit >= 4.4.0-6.10
  • php4-exif >= 4.4.0-6.10
  • php4-fastcgi >= 4.4.0-6.10
  • php4-mbstring >= 4.4.0-6.10
  • php4-servlet >= 4.4.0-6.10
  • php4-unixODBC >= 4.4.0-6.10
SUSE LINUX 9.3
  • apache2-mod_php5 >= 5.0.3-14.20
  • php5 >= 5.0.3-14.20
  • php5-devel >= 5.0.3-14.20
  • php5-exif >= 5.0.3-14.20
  • php5-fastcgi >= 5.0.3-14.20
  • php5-mbstring >= 5.0.3-14.20
  • php5-pear >= 5.0.3-14.20
  • php5-sysvmsg >= 5.0.3-14.20
  • php5-sysvshm >= 5.0.3-14.20
Open Enterprise Server
  • apache-mod_php4 >= 4.3.4-43.53
  • apache2-mod_php4 >= 4.3.4-43.53
  • mod_php4-core >= 4.3.4-43.53
  • mod_php4-servlet >= 4.3.4-43.53
  • php4 >= 4.3.4-43.53
  • php4-devel >= 4.3.4-43.53
  • php4-exif >= 4.3.4-43.53
  • php4-fastcgi >= 4.3.4-43.53
  • php4-imap >= 4.3.4-43.53
  • php4-mbstring >= 4.3.4-43.53
  • php4-mysql >= 4.3.4-43.53
  • php4-pear >= 4.3.4-43.53
  • php4-recode >= 4.3.4-43.53
  • php4-servlet >= 4.3.4-43.53
  • php4-session >= 4.3.4-43.53
  • php4-sysvshm >= 4.3.4-43.53
Builds
YOU Patch Nr: 10960