Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PHP:MEMORY-LIMIT-CE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

PHP memory_limit Arbitrary Code Execution

Release Date

2013/07/01

Update Number

2277

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: PHP memory_limit Arbitrary Code Execution


This signature detects attempts to exploit a known vulnerability against PHP. A successful attack can lead to arbitrary code execution.

Extended Description

PHP modules compiled with memory_limit support are affected by a remote code-execution vulnerability. This issue occurs because the PHP module fails to properly handle memory_limit request termination. An attacker can leverage this issue by exploiting the Apache ap_escape_html Memory Allocation Denial Of Service Vulnerability (BID 10619). The attacker can cause premature termination during critical code execution. Note that although the Apache vulnerability is the only known attack vector, there may be other attack vectors that are currently unknown. Attackers can exploit this issue to execute arbitrary code on an affected computer within the context of the vulnerable application, facilitating unauthorized access.

Affected Products

  • Apple Mac OS X 10.0.0
  • Apple Mac OS X 10.0.0 3
  • Apple Mac OS X 10.0.1
  • Apple Mac OS X 10.0.2
  • Apple Mac OS X 10.0.3
  • Apple Mac OS X 10.0.4
  • Apple Mac OS X 10.1.0
  • Apple Mac OS X 10.1.1
  • Apple Mac OS X 10.1.2
  • Apple Mac OS X 10.1.3
  • Apple Mac OS X 10.1.4
  • Apple Mac OS X 10.1.5
  • Apple Mac OS X 10.2.0
  • Apple Mac OS X 10.2.1
  • Apple Mac OS X 10.2.2
  • Apple Mac OS X 10.2.3
  • Apple Mac OS X 10.2.4
  • Apple Mac OS X 10.2.5
  • Apple Mac OS X 10.2.6
  • Apple Mac OS X 10.2.7
  • Apple Mac OS X 10.2.8
  • Apple Mac OS X 10.3.0
  • Apple Mac OS X 10.3.1
  • Apple Mac OS X 10.3.2
  • Apple Mac OS X 10.3.3
  • Apple Mac OS X 10.3.4
  • Apple Mac OS X 10.3.5
  • Apple Mac OS X 10.3.6
  • Apple Mac OS X 10.3.7
  • Apple Mac OS X Server 10.0.0
  • Apple Mac OS X Server 10.1.0
  • Apple Mac OS X Server 10.1.1
  • Apple Mac OS X Server 10.1.2
  • Apple Mac OS X Server 10.1.3
  • Apple Mac OS X Server 10.1.4
  • Apple Mac OS X Server 10.1.5
  • Apple Mac OS X Server 10.2.0
  • Apple Mac OS X Server 10.2.1
  • Apple Mac OS X Server 10.2.2
  • Apple Mac OS X Server 10.2.3
  • Apple Mac OS X Server 10.2.4
  • Apple Mac OS X Server 10.2.5
  • Apple Mac OS X Server 10.2.6
  • Apple Mac OS X Server 10.2.7
  • Apple Mac OS X Server 10.2.8
  • Apple Mac OS X Server 10.3.0
  • Apple Mac OS X Server 10.3.1
  • Apple Mac OS X Server 10.3.2
  • Apple Mac OS X Server 10.3.3
  • Apple Mac OS X Server 10.3.4
  • Apple Mac OS X Server 10.3.5
  • Apple Mac OS X Server 10.3.6
  • Apple Mac OS X Server 10.3.7
  • Avaya Converged Communications Server 2.0.0
  • Avaya Integrated Management
  • Avaya S8300 R2.0.0
  • Avaya S8300 R2.0.1
  • Avaya S8500 R2.0.0
  • Avaya S8500 R2.0.1
  • Avaya S8700 R2.0.0
  • Avaya S8700 R2.0.1
  • Debian Linux 3.0.0
  • Debian Linux 3.0.0 Alpha
  • Debian Linux 3.0.0 Arm
  • Debian Linux 3.0.0 Hppa
  • Debian Linux 3.0.0 Ia-32
  • Debian Linux 3.0.0 Ia-64
  • Debian Linux 3.0.0 M68k
  • Debian Linux 3.0.0 Mips
  • Debian Linux 3.0.0 Mipsel
  • Debian Linux 3.0.0 Ppc
  • Debian Linux 3.0.0 S/390
  • Debian Linux 3.0.0 Sparc
  • HP Compaq Secure Web Server for OpenVMS 1.2.0
  • HP Compaq Secure Web Server for OpenVMS 1.3.0
  • HP Compaq Secure Web Server for OpenVMS 2.0.0
  • HP Compaq Secure Web Server for OpenVMS 2.0.0 PHP
  • HP HP-UX B.11.00
  • HP HP-UX B.11.11
  • HP HP-UX B.11.22
  • HP HP-UX B.11.23
  • HP OpenVMS Secure Web Server 7.2.0 -2
  • HP OpenVMS Secure Web Server 7.3.0
  • HP OpenVMS Secure Web Server 7.3.0 -1
  • HP OpenVMS Secure Web Server 7.3.0 -2
  • Mandriva Linux Mandrake 10.0.0
  • Mandriva Linux Mandrake 10.0.0 amd64
  • Mandriva Linux Mandrake 9.2.0
  • Mandriva Linux Mandrake 9.2.0 amd64
  • PHP 3.0.0 0
  • PHP 3.0.0 .10
  • PHP 3.0.0 .11
  • PHP 3.0.0 .12
  • PHP 3.0.0 .13
  • PHP 3.0.0 .16
  • PHP 3.0.1
  • PHP 3.0.10
  • PHP 3.0.11
  • PHP 3.0.12
  • PHP 3.0.13
  • PHP 3.0.14
  • PHP 3.0.15
  • PHP 3.0.16
  • PHP 3.0.17
  • PHP 3.0.18
  • PHP 3.0.2
  • PHP 3.0.3
  • PHP 3.0.4
  • PHP 3.0.5
  • PHP 3.0.6
  • PHP 3.0.7
  • PHP 3.0.8
  • PHP 3.0.9
  • PHP 4.0.0 0
  • PHP 4.0.1
  • PHP 4.0.1 Pl1
  • PHP 4.0.1 Pl2
  • PHP 4.0.2
  • PHP 4.0.3
  • PHP 4.0.3 Pl1
  • PHP 4.0.4
  • PHP 4.0.5
  • PHP 4.0.6
  • PHP 4.0.7
  • PHP 4.0.7 RC1
  • PHP 4.0.7 RC2
  • PHP 4.0.7 RC3
  • PHP 4.1.0 .0
  • PHP 4.1.1
  • PHP 4.1.2
  • PHP 4.2.0 .0
  • PHP 4.2.0 -Dev
  • PHP 4.2.1
  • PHP 4.2.2
  • PHP 4.2.3
  • PHP 4.3.0
  • PHP 4.3.1
  • PHP 4.3.2
  • PHP 4.3.3
  • PHP 4.3.5
  • PHP 4.3.6
  • PHP 4.3.7
  • PHP 5.0.0 Candidate 1
  • PHP 5.0.0 Candidate 2
  • PHP 5.0.0 Candidate 3
  • Red Hat Desktop 3.0.0
  • Red Hat Enterprise Linux AS 3
  • Red Hat Enterprise Linux ES 3
  • Red Hat Enterprise Linux WS 3
  • Red Hat Fedora Core1
  • Red Hat Fedora Core2
  • Red Hat Linux 7.3.0
  • Red Hat Linux 7.3.0 I386
  • Red Hat Linux 7.3.0 I686
  • Red Hat Linux 8.0.0
  • Red Hat Linux 8.0.0 I386
  • Red Hat Linux 8.0.0 I686
  • Red Hat Linux 9.0.0 I386
  • Red Hat Stronghold 4.0.0
  • Trustix Secure Enterprise Linux 2.0.0
  • Trustix Secure Linux 1.5.0
  • Trustix Secure Linux 2.0.0
  • Trustix Secure Linux 2.1.0

References

  • BugTraq: 10725
  • CVE: CVE-2004-0594

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out