CVE-2006-7243

Publication date 18 January 2011

Last updated 24 July 2024


Ubuntu priority

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 11.10 oneiric
Not affected
11.04 natty
Not affected
10.10 maverick
Fixed 5.3.3-1ubuntu9.4
10.04 LTS lucid
Fixed 5.3.2-1ubuntu4.8
9.10 karmic
Fixed 5.2.10.dfsg.1-2ubuntu6.9
8.04 LTS hardy Ignored end of life
6.06 LTS dapper Ignored end of life

Notes


sbeattie

upstream only prepared a fix for the 5.3 tree. Backporting the fix to 5.2.x requires modifying php APIs.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references