Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:PHP:MEMORY-LIMIT-CE

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

PHP memory_limit Arbitrary Code Execution

Release Date

2013/07/01

Update Number

2277

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: PHP memory_limit Arbitrary Code Execution


This signature detects attempts to exploit a known vulnerability against PHP. A successful attack can lead to arbitrary code execution.

Extended Description

PHP modules compiled with memory_limit support are affected by a remote code-execution vulnerability. This issue occurs because the PHP module fails to properly handle memory_limit request termination. An attacker can leverage this issue by exploiting the Apache ap_escape_html Memory Allocation Denial Of Service Vulnerability (BID 10619). The attacker can cause premature termination during critical code execution. Note that although the Apache vulnerability is the only known attack vector, there may be other attack vectors that are currently unknown. Attackers can exploit this issue to execute arbitrary code on an affected computer within the context of the vulnerable application, facilitating unauthorized access.

Affected Products

  • Apple mac_os_x 10.0.0
  • Apple mac_os_x 10.0.0 3
  • Apple mac_os_x 10.0.1
  • Apple mac_os_x 10.0.2
  • Apple mac_os_x 10.0.3
  • Apple mac_os_x 10.0.4
  • Apple mac_os_x 10.1.0
  • Apple mac_os_x 10.1.1
  • Apple mac_os_x 10.1.2
  • Apple mac_os_x 10.1.3
  • Apple mac_os_x 10.1.4
  • Apple mac_os_x 10.1.5
  • Apple mac_os_x 10.2.0
  • Apple mac_os_x 10.2.1
  • Apple mac_os_x 10.2.2
  • Apple mac_os_x 10.2.3
  • Apple mac_os_x 10.2.4
  • Apple mac_os_x 10.2.5
  • Apple mac_os_x 10.2.6
  • Apple mac_os_x 10.2.7
  • Apple mac_os_x 10.2.8
  • Apple mac_os_x 10.3.0
  • Apple mac_os_x 10.3.1
  • Apple mac_os_x 10.3.2
  • Apple mac_os_x 10.3.3
  • Apple mac_os_x 10.3.4
  • Apple mac_os_x 10.3.5
  • Apple mac_os_x 10.3.6
  • Apple mac_os_x 10.3.7
  • Apple mac_os_x_server 10.0.0
  • Apple mac_os_x_server 10.1.0
  • Apple mac_os_x_server 10.1.1
  • Apple mac_os_x_server 10.1.2
  • Apple mac_os_x_server 10.1.3
  • Apple mac_os_x_server 10.1.4
  • Apple mac_os_x_server 10.1.5
  • Apple mac_os_x_server 10.2.0
  • Apple mac_os_x_server 10.2.1
  • Apple mac_os_x_server 10.2.2
  • Apple mac_os_x_server 10.2.3
  • Apple mac_os_x_server 10.2.4
  • Apple mac_os_x_server 10.2.5
  • Apple mac_os_x_server 10.2.6
  • Apple mac_os_x_server 10.2.7
  • Apple mac_os_x_server 10.2.8
  • Apple mac_os_x_server 10.3.0
  • Apple mac_os_x_server 10.3.1
  • Apple mac_os_x_server 10.3.2
  • Apple mac_os_x_server 10.3.3
  • Apple mac_os_x_server 10.3.4
  • Apple mac_os_x_server 10.3.5
  • Apple mac_os_x_server 10.3.6
  • Apple mac_os_x_server 10.3.7
  • Avaya converged_communications_server 2.0.0
  • Avaya integrated_management
  • Avaya s8300 R2.0.0
  • Avaya s8300 R2.0.1
  • Avaya s8500 R2.0.0
  • Avaya s8500 R2.0.1
  • Avaya s8700 R2.0.0
  • Avaya s8700 R2.0.1
  • Debian linux 3.0.0
  • Debian linux 3.0.0 Alpha
  • Debian linux 3.0.0 Arm
  • Debian linux 3.0.0 Hppa
  • Debian linux 3.0.0 Ia-32
  • Debian linux 3.0.0 Ia-64
  • Debian linux 3.0.0 M68k
  • Debian linux 3.0.0 Mips
  • Debian linux 3.0.0 Mipsel
  • Debian linux 3.0.0 Ppc
  • Debian linux 3.0.0 S/390
  • Debian linux 3.0.0 Sparc
  • Hp compaq_secure_web_server_for_openvms 1.2.0
  • Hp compaq_secure_web_server_for_openvms 1.3.0
  • Hp compaq_secure_web_server_for_openvms 2.0.0
  • Hp compaq_secure_web_server_for_openvms 2.0.0 PHP
  • Hp hp-ux B.11.00
  • Hp hp-ux B.11.11
  • Hp hp-ux B.11.22
  • Hp hp-ux B.11.23
  • Hp openvms_secure_web_server 7.2.0 -2
  • Hp openvms_secure_web_server 7.3.0
  • Hp openvms_secure_web_server 7.3.0 -1
  • Hp openvms_secure_web_server 7.3.0 -2
  • Mandriva linux_mandrake 10.0.0
  • Mandriva linux_mandrake 10.0.0 amd64
  • Mandriva linux_mandrake 9.2.0
  • Mandriva linux_mandrake 9.2.0 amd64
  • Php php 3.0.0 0
  • Php php 3.0.0 .10
  • Php php 3.0.0 .11
  • Php php 3.0.0 .12
  • Php php 3.0.0 .13
  • Php php 3.0.0 .16
  • Php php 3.0.1
  • Php php 3.0.10
  • Php php 3.0.11
  • Php php 3.0.12
  • Php php 3.0.13
  • Php php 3.0.14
  • Php php 3.0.15
  • Php php 3.0.16
  • Php php 3.0.17
  • Php php 3.0.18
  • Php php 3.0.2
  • Php php 3.0.3
  • Php php 3.0.4
  • Php php 3.0.5
  • Php php 3.0.6
  • Php php 3.0.7
  • Php php 3.0.8
  • Php php 3.0.9
  • Php php 4.0.0 0
  • Php php 4.0.1
  • Php php 4.0.1 Pl1
  • Php php 4.0.1 Pl2
  • Php php 4.0.2
  • Php php 4.0.3
  • Php php 4.0.3 Pl1
  • Php php 4.0.4
  • Php php 4.0.5
  • Php php 4.0.6
  • Php php 4.0.7
  • Php php 4.0.7 RC1
  • Php php 4.0.7 RC2
  • Php php 4.0.7 RC3
  • Php php 4.1.0 .0
  • Php php 4.1.1
  • Php php 4.1.2
  • Php php 4.2.0 .0
  • Php php 4.2.0 -Dev
  • Php php 4.2.1
  • Php php 4.2.2
  • Php php 4.2.3
  • Php php 4.3.0
  • Php php 4.3.1
  • Php php 4.3.2
  • Php php 4.3.3
  • Php php 4.3.5
  • Php php 4.3.6
  • Php php 4.3.7
  • Php php 5.0.0 Candidate 1
  • Php php 5.0.0 Candidate 2
  • Php php 5.0.0 Candidate 3
  • Red_hat desktop 3.0.0
  • Red_hat enterprise_linux_as 3
  • Red_hat enterprise_linux_es 3
  • Red_hat enterprise_linux_ws 3
  • Red_hat fedora Core1
  • Red_hat fedora Core2
  • Red_hat linux 7.3.0
  • Red_hat linux 7.3.0 I386
  • Red_hat linux 7.3.0 I686
  • Red_hat linux 8.0.0
  • Red_hat linux 8.0.0 I386
  • Red_hat linux 8.0.0 I686
  • Red_hat linux 9.0.0 I386
  • Red_hat stronghold 4.0.0
  • Trustix secure_enterprise_linux 2.0.0
  • Trustix secure_linux 1.5.0
  • Trustix secure_linux 2.0.0
  • Trustix secure_linux 2.1.0

References

  • BugTraq: 10725
  • CVE: CVE-2004-0594

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out