5
CVSSv2

CVE-2007-0908

Published: 13/02/2007 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The WDDX deserializer in the wddx extension in PHP 5 prior to 5.2.1 and PHP 4 prior to 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent malicious users to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0

php php

canonical ubuntu linux 5.10

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

Vendor Advisories

Debian Bug report logs - #410561 php5: multiple security issues fixed in php 521 Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sun, 11 Feb 2007 19:48:02 UTC S ...
USN-424-1 fixed vulnerabilities in PHP However, some upstream changes were not included, which caused errors in the stream filters This update fixes the problem ...
Multiple buffer overflows have been discovered in various PHP modules If a PHP application processes untrusted data with functions of the session or zip module, or various string functions, a remote attacker could exploit this to execute arbitrary code with the privileges of the web server (CVE-2007-0906) ...
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-0906 It was discovered that an integer overflow in the str_replace() function could lead ...

Exploits

<?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ // // | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ // // |_||_|\__,_||_| \__,_|\___||_||_|\_ ...

References

CWE-20http://www.php.net/ChangeLog-5.php#5.2.1http://www.php.net/releases/5_2_1.phphttp://www.securityfocus.com/bid/22496http://secunia.com/advisories/24089https://issues.rpath.com/browse/RPL-1088http://support.avaya.com/elmodocs2/security/ASA-2007-101.htmhttp://www.us.debian.org/security/2007/dsa-1264http://security.gentoo.org/glsa/glsa-200703-21.xmlhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0076.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0081.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0089.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0088.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0082.htmlhttp://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.htmlhttp://www.ubuntu.com/usn/usn-424-1http://www.ubuntu.com/usn/usn-424-2http://www.securitytracker.com/id?1017671http://secunia.com/advisories/24195http://secunia.com/advisories/24217http://secunia.com/advisories/24248http://secunia.com/advisories/24236http://secunia.com/advisories/24295http://secunia.com/advisories/24322http://secunia.com/advisories/24432http://secunia.com/advisories/24421http://secunia.com/advisories/24514http://secunia.com/advisories/24606http://support.avaya.com/elmodocs2/security/ASA-2007-136.htmhttp://secunia.com/advisories/24642http://www.php-security.org/MOPB/MOPB-11-2007.htmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:048ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.aschttp://www.trustix.org/errata/2007/0009/http://www.securityfocus.com/bid/22806http://secunia.com/advisories/24284http://secunia.com/advisories/24419http://securityreason.com/securityalert/2321http://osvdb.org/32766http://www.vupen.com/english/advisories/2007/0546https://exchange.xforce.ibmcloud.com/vulnerabilities/32493https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11185http://www.securityfocus.com/archive/1/461462/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410561https://nvd.nist.govhttps://usn.ubuntu.com/424-2/https://www.exploit-db.com/exploits/3414/