Name | CVE-2006-2660 |
Description | Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php5 (PTS) | jessie, jessie (lts) | 5.6.40+dfsg-0+deb8u21 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
php4 | source | (unstable) | 4:4.4.4-1 | unimportant | | |
php5 | source | (unstable) | 5.1.6-1 | unimportant | | |
Notes
using a long enough path (>MAXPATHLEN) allows you to have
tempnam create a file without the temp extension. sounds like
another shoot yourself in the foot issue, since the local user
could just as easily create the file manually, and if the
tempnam function is taking unsanitized input, it's an
application error