7.5
CVSSv2

CVE-2007-1376

Published: 10/03/2007 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The shmop functions in PHP prior to 4.4.5, and prior to 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent malicious users to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.1

php php 4.0.6

php php 4.0.7

php php 4.0.2

php php 4.0.3

php php 4.0

php php 4.0.0

php php 4.0.4

php php 4.0.5

php php 4.1.0

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 4.4.4

php php 4.4.5

php php 5.0.0

php php 5.0

php php 5.1.6

php php 5.2.0

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 4.4.2

php php 4.4.3

php php 5.0.5

php php 5.1.4

php php 5.1.5

php php 4.2.0

php php 4.2.1

php php 4.3.11

php php 4.3.2

php php 4.4.0

php php 4.4.1

php php 5.0.3

php php 5.0.4

php php 5.1.2

php php 5.1.3

php php 4.1.1

php php 4.1.2

php php 4.3.1

php php 4.3.10

php php 4.3.7

php php 4.3.8

php php 4.3.9

php php 5.0.1

php php 5.0.2

php php 5.1.0

php php 5.1.1

Vendor Advisories

Stefan Esser discovered multiple vulnerabilities in the “Month of PHP bugs” ...
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1286 Stefan Esser discovered an overflow in the object reference handling code of the un ...

Exploits

<?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ // // | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ // // |_||_|\__,_||_| \__,_|\___||_||_|\_ ...
<?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ // // | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ // // |_||_|\__,_||_| \__,_|\___||_||_|\_ ...