Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-3799

Published: 16 July 2007

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

Notes

AuthorNote
kees
http://cvs.php.net/viewvc.cgi/php-src/ext/session/session.c?r1=1.417.2.8.2.36&r2=1.417.2.8.2.37&pathrev=PHP_5_2
204-start-session-cookies.patch

Priority

Low

Status

Package Release Status
php4
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
edgy Ignored
(end of life, was needed)
feisty Does not exist

gutsy Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream Needed

Patches:
upstream: http://cvs.php.net/viewvc.cgi/php-src/ext/session/session.c?r1=1.417.2.8.2.36&r2=1.417.2.8.2.37&pathrev=PHP_5_2
php5
Launchpad, Ubuntu, Debian
dapper
Released (5.1.2-1ubuntu3.10)
edgy
Released (5.1.6-1ubuntu2.7)
feisty
Released (5.2.1-0ubuntu1.5)
gutsy
Released (5.2.3-1ubuntu6.1)
hardy Not vulnerable
(5.2.4-2ubuntu3)
intrepid Not vulnerable
(5.2.4-2ubuntu3)
jaunty Not vulnerable
(5.2.4-2ubuntu3)
karmic Not vulnerable
(5.2.4-2ubuntu3)
upstream
Released (5.2.3)