Description
PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2001-1 | New php5 packages fix multiple vulnerabilities |
Debian DSA |
DSA-2002-1 | New polipo packages fix denial of service |
EUVD |
EUVD-2009-4113 | PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive. |
Ubuntu USN |
USN-882-1 | PHP vulnerabilities |
References
History
Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:54:09.936Z
Reserved: 2009-12-01T00:00:00.000Z
Link: CVE-2009-4143
No data.
Status : Modified
Published: 2009-12-21T16:30:00.360
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-4143
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN