Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2006-6383

Back to Search

SUSE Linux Security Vulnerability: CVE-2006-6383

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
12/10/2006
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

Solution(s)

  • suse-upgrade-apache-mod_php4
  • suse-upgrade-apache2-mod_php4
  • suse-upgrade-apache2-mod_php5
  • suse-upgrade-mod_php4-core
  • suse-upgrade-mod_php4-servlet
  • suse-upgrade-php4-devel
  • suse-upgrade-php4-exif
  • suse-upgrade-php4-fastcgi
  • suse-upgrade-php4-imap
  • suse-upgrade-php4-mhash
  • suse-upgrade-php4-mysql
  • suse-upgrade-php4-pear
  • suse-upgrade-php4-session
  • suse-upgrade-php4-sysvshm
  • suse-upgrade-php4-unixodbc
  • suse-upgrade-php4-wddx
  • suse-upgrade-php5-bcmath
  • suse-upgrade-php5-curl
  • suse-upgrade-php5-dba
  • suse-upgrade-php5-devel
  • suse-upgrade-php5-dom
  • suse-upgrade-php5-exif
  • suse-upgrade-php5-fastcgi
  • suse-upgrade-php5-ftp
  • suse-upgrade-php5-gd
  • suse-upgrade-php5-iconv
  • suse-upgrade-php5-imap
  • suse-upgrade-php5-ldap
  • suse-upgrade-php5-mbstring
  • suse-upgrade-php5-mhash
  • suse-upgrade-php5-mysql
  • suse-upgrade-php5-odbc
  • suse-upgrade-php5-pear
  • suse-upgrade-php5-pgsql
  • suse-upgrade-php5-soap
  • suse-upgrade-php5-sysvmsg
  • suse-upgrade-php5-sysvshm
  • suse-upgrade-php5-wddx
  • suse-upgrade-php5-xmlrpc
  • suse-upgrade-php5-zip
  • suse-upgrade-suse-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;