Unrated severityNVD Advisory· Published Sep 22, 2009· Updated Apr 23, 2026
CVE-2009-3294
CVE-2009-3294
Description
The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.openwall.com/lists/oss-security/2009/09/20/1nvdMailing ListPatch
- www.php.net/releases/5_2_11.phpnvdPatchVendor Advisory
- bugs.php.net/bug.phpnvdExploitVendor Advisory
- news.php.net/php.announce/79nvdVendor Advisory
- svn.php.net/viewvcnvdVendor Advisory
- www.php.net/ChangeLog-5.phpnvdVendor Advisory
- www.php.net/ChangeLog-5.phpnvdVendor Advisory
- www.php.net/releases/5_3_1.phpnvdVendor Advisory
- www.openwall.com/lists/oss-security/2009/11/20/2nvdMailing List
- www.openwall.com/lists/oss-security/2009/11/20/3nvdMailing List
- www.osvdb.org/58188nvdBroken Link
News mentions
0No linked articles in our index yet.