Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2006-4625

Back to Search

SUSE Linux Security Vulnerability: CVE-2006-4625

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
09/12/2006
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

Solution(s)

  • suse-upgrade-apache-mod_php4
  • suse-upgrade-apache2-mod_php4
  • suse-upgrade-mod_php4-core
  • suse-upgrade-mod_php4-servlet
  • suse-upgrade-php4-curl
  • suse-upgrade-php4-devel
  • suse-upgrade-php4-exif
  • suse-upgrade-php4-fastcgi
  • suse-upgrade-php4-gd
  • suse-upgrade-php4-imap
  • suse-upgrade-php4-mbstring
  • suse-upgrade-php4-mysql
  • suse-upgrade-php4-pear
  • suse-upgrade-php4-pgsql
  • suse-upgrade-php4-recode
  • suse-upgrade-php4-session
  • suse-upgrade-php4-sysvshm
  • suse-upgrade-php4-wddx

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;