3.3 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:P/A:P
php-pear is vulnerable to symlink attack. It was found that the “pear” command created temporary files in an insecure way when installing packages. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files accessible to the victim running the pear install
command.
CPE | Name | Operator | Version |
---|---|---|---|
php-pear | eq | 1.9.0__2.el6 | |
php-pear | eq | 1.9.0__2.el6 |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164
news.php.net/php.pear.cvs/61264
openwall.com/lists/oss-security/2011/02/28/12
openwall.com/lists/oss-security/2011/02/28/3
openwall.com/lists/oss-security/2011/02/28/5
openwall.com/lists/oss-security/2011/03/01/4
openwall.com/lists/oss-security/2011/03/01/5
openwall.com/lists/oss-security/2011/03/01/7
openwall.com/lists/oss-security/2011/03/01/8
openwall.com/lists/oss-security/2011/03/01/9
pear.php.net/advisory-20110228.txt
pear.php.net/bugs/bug.php?id=18056
secunia.com/advisories/43533
security-tracker.debian.org/tracker/CVE-2011-1072
svn.php.net/viewvc?view=revision&revision=308687
www.mandriva.com/security/advisories?name=MDVSA-2011:187
www.redhat.com/support/errata/RHSA-2011-1741.html
www.securityfocus.com/bid/46605
access.redhat.com/errata/RHSA-2011:1741
access.redhat.com/security/updates/classification/#low
exchange.xforce.ibmcloud.com/vulnerabilities/65721