CVE-2015-4026Null Byte Interaction Error (Poison Null Byte) in Apple MAC OS X

Severity
7.5HIGHNVD
CNA5.0OSV6.5OSV5.0
EPSS
9.6%
top 7.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 9
Latest updateMay 14

Description

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages7 packages

Ubuntuphp5/php5< 5.5.9+dfsg-1ubuntu4.11
NVDphp/php5.4.40+31
NVDapple/mac_os_x10.10.4

Also affects: Enterprise Linux 6.0, 7.0, 7.1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-2xvw-fxc9-x223: The pcntl_exec implementation in PHP before 52022-05-14
OSV
php5 vulnerabilities2015-07-06
OSV
CVE-2015-4026: The pcntl_exec implementation in PHP before 52015-06-09
CVEList
CVE-2015-4026: The pcntl_exec implementation in PHP before 52015-06-09

📋Vendor Advisories

3
Ubuntu
PHP vulnerabilities2015-07-06
Red Hat
php: pcntl_exec() accepts paths with NUL character2015-05-14
Apple
CVE-2015-4026: OS X Yosemite v10.10.5 and Security Update 2015-006

💬Community

2
Bugzilla
CVE-2015-4021 CVE-2015-4025 CVE-2015-4026 php: various flaws [fedora-all]2015-05-20
Bugzilla
CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character2015-05-20
CVE-2015-4026 — Apple MAC OS X vulnerability | cvebase