Critical severity9.8NVD Advisory· Published May 5, 2008· Updated Apr 23, 2026
CVE-2008-0599
CVE-2008-0599
Description
The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
Affected products
9cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
36- cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.cnvdBroken LinkExploit
- secunia.com/advisories/30048nvdBroken LinkVendor Advisory
- secunia.com/advisories/30345nvdBroken LinkVendor Advisory
- security.gentoo.org/glsa/glsa-200811-05.xmlnvdThird Party Advisory
- www.kb.cert.org/vuls/id/147027nvdThird Party AdvisoryUS Government Resource
- www.securityfocus.com/archive/1/492535/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/29009nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-628-1nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/42137nvdThird Party AdvisoryVDB Entry
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvdBroken Link
- lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlnvdMailing List
- marc.infonvdMailing List
- marc.infonvdMailing List
- secunia.com/advisories/30083nvdBroken Link
- secunia.com/advisories/30616nvdBroken Link
- secunia.com/advisories/30757nvdBroken Link
- secunia.com/advisories/30828nvdBroken Link
- secunia.com/advisories/31200nvdBroken Link
- secunia.com/advisories/31326nvdBroken Link
- secunia.com/advisories/32746nvdBroken Link
- secunia.com/advisories/35650nvdBroken Link
- wiki.rpath.com/wiki/Advisories:rPSA-2008-0176nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.openwall.com/lists/oss-security/2008/05/02/2nvdMailing List
- www.php.net/ChangeLog-5.phpnvdRelease Notes
- www.redhat.com/support/errata/RHSA-2008-0505.htmlnvdBroken Link
- www.slackware.com/security/viewer.phpnvdBroken Link
- www.vupen.com/english/advisories/2008/1412nvdBroken Link
- www.vupen.com/english/advisories/2008/1810/referencesnvdBroken Link
- www.vupen.com/english/advisories/2008/2268nvdBroken Link
- issues.rpath.com/browse/RPL-2503nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510nvdBroken Link
- www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.htmlnvdMailing List
- www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.htmlnvdMailing List
News mentions
0No linked articles in our index yet.