Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2004-0594 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical Remote Code Execution (RCE) flaw in PHP's memory management.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: Flaw in the `memory_limit` function during `zend_hash_init`.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: β€’ PHP 4.x – 4.3.7 β€’ PHP 5.x – 5.0.0RC3 🌐 **Component**: Core PHP Engine (Zend Engine memory handling).

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: β€’ Execute **arbitrary system commands**. β€’ Gain **full administrative privileges** on the web server. β€’ Access/modify sensitive data. β€’ Install backdoors or malware.

Q5Is exploitation threshold high? (Auth/Config)

βš™οΈ **Exploitation Threshold**: β€’ **Auth**: None (Remote). β€’ **Config**: Requires `register_globals` to be **ON** (common in older setups). β€’ **Difficulty**: Moderate.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exploit**: Yes. References indicate active exploitation and vendor advisories (Gentoo, Debian, RedHat) were issued shortly after disclosure. Wild exploitation is likely given the severity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Run `php -v` to check version (must be < 4.3.8 or < 5.0.0RC4). 2. Check `phpinfo()` for `register_globals` status. 3. Scan for PHP versions in the 2004-era EOL range.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: Yes. Vendors released patches (e.g., RHSA-2004:392, DSA-531). **Action**: Upgrade PHP to a version **newer than 4.3.7 and 5.0.0RC3** immediately.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **No Patch Workaround**: 1. **Disable `register_globals`** in `php.ini` (Critical!). 2. Upgrade PHP if possible. 3. Implement strict input validation and WAF rules to block suspicious memory-related requests.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. This is a remote, unauthenticated RCE. Even though it's an old CVE, any legacy system running these versions is an **open door** for attackers. Patch immediately!