CVE-2002-0985

N/A Unknown
Published: September 24, 2002 Modified: April 16, 2026
View on NVD

Description

Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=103011916928204&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=105760591228031&w=2
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2002/dsa-168
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.osvdb.org/2111
Source: cve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-213.html
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9966
Source: cve@mitre.org
Third Party Advisory VDB Entry
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=103011916928204&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=105760591228031&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2002/dsa-168
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2002_036_modphp4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/2111
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-213.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-214.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-243.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-244.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-248.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-159.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/9966
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openpkg php