6.8
CVSSv2

CVE-2007-1001

Published: 06/04/2007 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 up to and including 4.4.6 and 5.0.0 up to and including 5.2.1 allow context-dependent malicious users to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.0

php php 4.0.1

php php 4.0.5

php php 4.0.6

php php 4.0

php php 4.2.0

php php 4.2.1

php php 4.2.2

php php 4.3.2

php php 4.3.3

php php 4.4.0

php php 4.4.1

php php 5.0.0

php php 5.0.3

php php 5.0.4

php php 5.1.1

php php 5.1.2

php php 4.0.4

php php 4.1.1

php php 4.1.2

php php 4.3.10

php php 4.3.11

php php 4.3.8

php php 4.3.9

php php 4.4.6

php php 5.0.1

php php 5.0.2

php php 5.1.0

php php 5.2.1

php php 4.0.3

php php 4.0.7

php php 4.1.0

php php 4.3.0

php php 4.3.1

php php 4.3.6

php php 4.3.7

php php 4.4.4

php php 4.4.5

php php 5.0

php php 5.1.5

php php 5.1.6

php php 5.2.0

php php 4.0.2

php php 4.2.3

php php 4.2

php php 4.3.4

php php 4.3.5

php php 4.4.2

php php 4.4.3

php php 5.0.5

php php 5.1.3

php php 5.1.4

Exploits

source: wwwsecurityfocuscom/bid/23357/info PHP's GD extension is prone to two integer-overflow vulnerabilities because it fails to ensure that integer values aren't overrun Successfully exploiting these issues allows attackers to crash the affected application, potentially denying service to legitimate users Due to the nature of the is ...

References

CWE-189http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?revision=1.2.4.1.8.1&view=markuphttp://www.securityfocus.com/bid/23357http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0155.htmlhttp://secunia.com/advisories/24814http://secunia.com/advisories/24924https://issues.rpath.com/browse/RPL-1268http://www.redhat.com/support/errata/RHSA-2007-0153.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0162.htmlhttp://secunia.com/advisories/24965http://secunia.com/advisories/24945http://us2.php.net/releases/4_4_7.phphttp://us2.php.net/releases/5_2_2.phphttp://secunia.com/advisories/24909http://docs.info.apple.com/article.html?artnum=306172http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlhttp://security.gentoo.org/glsa/glsa-200705-19.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:087http://www.mandriva.com/security/advisories?name=MDKSA-2007:088http://www.mandriva.com/security/advisories?name=MDKSA-2007:089http://www.mandriva.com/security/advisories?name=MDKSA-2007:090http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.470053http://www.novell.com/linux/security/advisories/2007_32_php.htmlhttp://www.securityfocus.com/bid/25159http://secunia.com/advisories/25056http://secunia.com/advisories/25445http://secunia.com/advisories/26235http://secunia.com/advisories/25151http://www.vupen.com/english/advisories/2007/2732http://www.vupen.com/english/advisories/2007/1269https://exchange.xforce.ibmcloud.com/vulnerabilities/33453https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10179http://www.securityfocus.com/archive/1/466166/100/0/threadedhttp://www.securityfocus.com/archive/1/464957/100/0/threadedhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/29823/