PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
|
|
SecurityTracker Alert ID: 1017671 |
|
SecurityTracker URL: http://securitytracker.com/id/1017671
|
|
CVE Reference:
CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988
(Links to External Site)
|
Date: Feb 20 2007
|
Impact:
Denial of service via local system, Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 5.2.1
|
Description:
Several vulnerabilities were reported in PHP. A remote or local user may be able to execute arbitrary code on the target system or cause denial of service conditions.
Several buffer overflows exist in some PHP functions [CVE-2007-0906]. The PHP session extension, the str_replace() function, and the imap_mail_compose() functions are affected. A remote user may be able to submit specially crafted values to a program that uses the affected function to trigger an overflow and execute arbitrary code.
A buffer underflow in the sapi_header_op() function may let users cause denial of service conditions [CVE-2007-0907].
The wddx extension can be exploited using certain WDDX input packets to view random portions of heap memory [CVE-2007-0908].
A remote user under control of a database table accessed via the odbc_result_all() function can supply specially crafted data to trigger a format string flaw and execute arbitrary code [CVE-2007-0909].
Unspecified vulnerabilities may allow a user to overwrite certain super-global variables [CVE-2007-0910].
A user can supply specially crafted data to the zend_hash_init() function to cause the function to enter an infinite loop and consume excessive CPU resources until a timeout is reached [CVE-2007-0988].
|
Impact:
A remote or local user may be able to execute arbitrary code on the target system.
A remote or local user may be able to cause denial of service conditions.
The specific impact depends on the applications using PHP.
|
Solution:
The vendor has issued a fixed version (5.2.1).
The PHP advisory is available at:
http://www.php.net/releases/5_2_1.php
|
Vendor URL: www.php.net/releases/5_2_1.php (Links to External Site)
|
Cause:
Boundary error, Input validation error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|