7.5
CVSSv2

CVE-2003-0166

Published: 02/04/2003 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer signedness error in emalloc() function for PHP prior to 4.3.2 allow remote malicious users to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.5

php php 4.0.6

php php 4.2.2

php php 4.2.3

php php 4.0.7

php php 4.1.0

php php 4.3.0

php php 4.3.1

php php 4.0.3

php php 4.0.4

php php 4.2.0

php php 4.2.1

php php 4.0

php php 4.0.1

php php 4.0.2

php php 4.1.1

php php 4.1.2

Exploits

source: wwwsecurityfocuscom/bid/7197/info A vulnerability has been reported in PHP versions 431 and earlier The problem occurs in the socket_recv() and may allow an attacker to corrupt memory Specifically, the affected function fails to carry out sanity checks on user-supplied argument values, making it prone to an integer overflow ...
source: wwwsecurityfocuscom/bid/7198/info A vulnerability has been reported in PHP versions 431 and earlier The problem occurs in the socket_recvfrom() and may allow an attacker to corrupt memory Specifically, the affected function fails to carry out sanity checks on user-supplied argument values, making it prone to an integer overflo ...
source: wwwsecurityfocuscom/bid/7187/info A vulnerability has been reported in PHP versions 431 and earlier The problem occurs in the socket_iovec_alloc() and may allow an attacker to corrupt memory Specifically, the affected function fails to carry out sanity checks on user-supplied argument values, making it prone to an integer over ...