Upstream information
Description
The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
SUSE Security Advisories:
- SUSE-SU-2012:1156-1, published Wed Sep 12 16:09:06 MDT 2012
- SUSE-SU-2012:1156-2, published Thu Sep 13 18:08:27 MDT 2012
- SUSE-SU-2013:1351-1, published Fri Aug 16 13:04:10 MDT 2013 openSUSE-SU-2012:1169-1
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 13:05:42 2013CVE page last modified: Thu Dec 7 13:12:29 2023