CVE Reference: CVE-2007-3799

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2007-3799

Description:
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/usn-549-2
  http://www.ubuntulinux.org/support/documentation/usn/usn-549-1

SUSE
  http://www.novell.com/linux/security/advisories/2007_15_sr.html

SAID
  Secunia Advisory: SA26930
  Secunia Advisory: SA26871
  Secunia Advisory: SA26895
  Secunia Advisory: SA26967
  Secunia Advisory: SA27351
  Secunia Advisory: SA27377
  Secunia Advisory: SA27545
  Secunia Advisory: SA27864
  Secunia Advisory: SA28249
  Secunia Advisory: SA29420
  Secunia Advisory: SA30288

REDHAT
  http://www.redhat.com/support/errata/RHSA-2007-0891.html
  http://www.redhat.com/support/errata/RHSA-2007-0888.html
  http://rhn.redhat.com/errata/RHSA-2007-0889.html
  http://www.redhat.com/support/errata/RHSA-2007-0890.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9792

OSVDB
  36855

MISC
  http://www.php-security.org/MOPB/PMOPB-46-2007.html

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDKSA-2007:187

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1578
  http://www.debian.org/security/2008/dsa-1444

CONFIRM
  http://docs.info.apple.com/article.html?artnum=307562
  http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm

BID
  24268

APPLE
  http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html


Return to the previous page.