UBUNTU-CVE-2017-5630

Source
https://ubuntu.com/security/CVE-2017-5630
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-5630
Upstream
Published
2017-02-01T23:59:00Z
Modified
2026-01-20T16:50:00.014350Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - negligible
Summary
[none]
Details

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

References

Affected packages

Ubuntu:18.04:LTS
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.5+submodules+notgz-1ubuntu1.18.04.4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.5+submodules+notgz-1
1:1.10.5+submodules+notgz-1ubuntu1
1:1.10.5+submodules+notgz-1ubuntu1.18.04.1
1:1.10.5+submodules+notgz-1ubuntu1.18.04.2
1:1.10.5+submodules+notgz-1ubuntu1.18.04.3
1:1.10.5+submodules+notgz-1ubuntu1.18.04.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.5+submodules+notgz-1ubuntu1.18.04.4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:20.04:LTS
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.9+submodules+notgz-1ubuntu0.20.04.3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.9+submodules+notgz-1
1:1.10.9+submodules+notgz-1ubuntu0.20.04.1
1:1.10.9+submodules+notgz-1ubuntu0.20.04.2
1:1.10.9+submodules+notgz-1ubuntu0.20.04.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.9+submodules+notgz-1ubuntu0.20.04.3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:22.04:LTS
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.12+submodules+notgz+20210212-1ubuntu3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.12+submodules+notgz+20210212-1ubuntu1
1:1.10.12+submodules+notgz+20210212-1ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.12+submodules+notgz+20210212-1ubuntu3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:24.04:LTS
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.13+submodules+notgz+2022032202-2build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.13+submodules+notgz+2022032202-2build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.13+submodules+notgz+2022032202-2build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:25.10
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.16+submodules+notgz-3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.13+submodules+notgz+2022032202-2build1
1:1.10.16+submodules+notgz-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.16+submodules+notgz-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:Pro:14.04:LTS
php5

Package

Name
php5
Purl
pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.29+esm16?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.5.3+dfsg-1ubuntu2
5.5.3+dfsg-1ubuntu3
5.5.6+dfsg-1ubuntu1
5.5.6+dfsg-1ubuntu2
5.5.8+dfsg-2ubuntu1
5.5.9+dfsg-1ubuntu1
5.5.9+dfsg-1ubuntu2
5.5.9+dfsg-1ubuntu3
5.5.9+dfsg-1ubuntu4
5.5.9+dfsg-1ubuntu4.1
5.5.9+dfsg-1ubuntu4.2
5.5.9+dfsg-1ubuntu4.3
5.5.9+dfsg-1ubuntu4.4
5.5.9+dfsg-1ubuntu4.5
5.5.9+dfsg-1ubuntu4.6
5.5.9+dfsg-1ubuntu4.7
5.5.9+dfsg-1ubuntu4.9
5.5.9+dfsg-1ubuntu4.11
5.5.9+dfsg-1ubuntu4.12
5.5.9+dfsg-1ubuntu4.13
5.5.9+dfsg-1ubuntu4.14
5.5.9+dfsg-1ubuntu4.16
5.5.9+dfsg-1ubuntu4.17
5.5.9+dfsg-1ubuntu4.19
5.5.9+dfsg-1ubuntu4.20
5.5.9+dfsg-1ubuntu4.21
5.5.9+dfsg-1ubuntu4.22
5.5.9+dfsg-1ubuntu4.23
5.5.9+dfsg-1ubuntu4.24
5.5.9+dfsg-1ubuntu4.25
5.5.9+dfsg-1ubuntu4.26
5.5.9+dfsg-1ubuntu4.27
5.5.9+dfsg-1ubuntu4.29
5.5.9+dfsg-1ubuntu4.29+esm1
5.5.9+dfsg-1ubuntu4.29+esm2
5.5.9+dfsg-1ubuntu4.29+esm3
5.5.9+dfsg-1ubuntu4.29+esm4
5.5.9+dfsg-1ubuntu4.29+esm5
5.5.9+dfsg-1ubuntu4.29+esm6
5.5.9+dfsg-1ubuntu4.29+esm8
5.5.9+dfsg-1ubuntu4.29+esm10
5.5.9+dfsg-1ubuntu4.29+esm11
5.5.9+dfsg-1ubuntu4.29+esm12
5.5.9+dfsg-1ubuntu4.29+esm13
5.5.9+dfsg-1ubuntu4.29+esm14
5.5.9+dfsg-1ubuntu4.29+esm15
5.5.9+dfsg-1ubuntu4.29+esm16

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libapache2-mod-php5",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "libapache2-mod-php5filter",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "libphp5-embed",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php-pear",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-cgi",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-cli",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-common",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-curl",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-dev",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-enchant",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-fpm",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-gd",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-gmp",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-intl",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-ldap",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-mysql",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-mysqlnd",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-odbc",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-pgsql",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-pspell",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-readline",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-recode",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-snmp",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-sqlite",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-sybase",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-tidy",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-xmlrpc",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        },
        {
            "binary_name": "php5-xsl",
            "binary_version": "5.5.9+dfsg-1ubuntu4.29+esm16"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"
Ubuntu:Pro:16.04:LTS
php-pear

Package

Name
php-pear
Purl
pkg:deb/ubuntu/php-pear@1:1.10.1+submodules+notgz-6ubuntu0.3+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*
1:1.10.1+submodules+notgz-4
1:1.10.1+submodules+notgz-6
1:1.10.1+submodules+notgz-6ubuntu0.1
1:1.10.1+submodules+notgz-6ubuntu0.2
1:1.10.1+submodules+notgz-6ubuntu0.3
1:1.10.1+submodules+notgz-6ubuntu0.3+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "php-pear",
            "binary_version": "1:1.10.1+submodules+notgz-6ubuntu0.3+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5630.json"