Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.php.net/ChangeLog-5.php", "name": "http://www.php.net/ChangeLog-5.php", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2009/11/20/7", "name": "[oss-security] 20091120 Re: CVE request: php 5.3.1 update", "tags": [], "refsource": "MLIST"}, {"url": "http://seclists.org/fulldisclosure/2009/Nov/228", "name": "20091120 PHP \"multipart/form-data\" denial of service", "tags": [], "refsource": "FULLDISC"}, {"url": "http://news.php.net/php.announce/79", "name": "[php-announce] 20091119 5.3.1 Release announcement", "tags": [], "refsource": "MLIST"}, {"url": "http://www.php.net/releases/5_3_1.php", "name": "http://www.php.net/releases/5_3_1.php", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2009/11/20/2", "name": "[oss-security] 20091120 CVE request: php 5.3.1 update", "tags": ["Patch"], "refsource": "MLIST"}, {"url": "http://secunia.com/advisories/37482", "name": "37482", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:305", "name": "MDVSA-2009:305", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.debian.org/security/2009/dsa-1940", "name": "DSA-1940", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303", "name": "MDVSA-2009:303", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://secunia.com/advisories/37821", "name": "37821", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/", "name": "http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/", "tags": [], "refsource": "MISC"}, {"url": "http://www.php.net/releases/5_2_12.php", "name": "http://www.php.net/releases/5_2_12.php", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2009/3593", "name": "ADV-2009-3593", "tags": [], "refsource": "VUPEN"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html", "name": "APPLE-SA-2010-03-29-1", "tags": [], "refsource": "APPLE"}, {"url": "http://support.apple.com/kb/HT4077", "name": "http://support.apple.com/kb/HT4077", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/40262", "name": "40262", "tags": [], "refsource": "SECUNIA"}, {"url": "http://marc.info/?l=bugtraq&m=127680701405735&w=2", "name": "HPSBUX02543", "tags": [], "refsource": "HP"}, {"url": "http://secunia.com/advisories/41490", "name": "41490", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995", "name": "HPSBMA02568", "tags": [], "refsource": "HP"}, {"url": "http://secunia.com/advisories/41480", "name": "41480", "tags": [], "refsource": "SECUNIA"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54455", "name": "php-multipart-formdata-dos(54455)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667", "name": "oval:org.mitre.oval:def:6667", "tags": [], "refsource": "OVAL"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483", "name": "oval:org.mitre.oval:def:10483", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/507982/100/0/threaded", "name": "20091120 PHP \"multipart/form-data\" denial of service", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2009-4017", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2009-11-24T00:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-10T19:48Z"}