PHP Vulnerability: CVE-2012-2336
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | May 11, 2012 | October 01, 2012 | February 13, 2015 |
Description
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
Scan For This Vulnerability
Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities
References
Solution
php-upgrade-5_3_13Related Vulnerabilities
- SUSE Linux Security Vulnerability: CVE-2012-2336
- RHSA-2012:1046: php security update
- USN-1481-1: PHP vulnerabilities
- Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 4
- RHSA-2012:1047: php53 security update
- RHSA-2012:1045: php security update
- ELSA-2012-1046 Moderate: Oracle Linux php security update
- Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 3
- ELSA-2012-1047 Moderate: Oracle Linux php53 security update
- Gentoo Linux: CVE-2012-2336: PHP: Multiple vulnerabilities
- ELSA-2012-1045 Moderate: Oracle Linux php security update