5
CVSSv2

CVE-2007-1717

Published: 28/03/2007 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mail function in PHP 4.0.0 up to and including 4.4.6 and 5.0.0 up to and including 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent malicious users to prevent intended information from being delivered in e-mail messages. NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.1

php php 4.0.2

php php 4.0.3

php php 4.0.7

php php 4.0

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.0.0

php php 4.0.4

php php 4.0.5

php php 4.1.2

php php 4.2.0

php php 4.3.11

php php 4.3.2

php php 4.3.9

php php 4.4.0

php php 5.0.0

php php 5.0.2

php php 5.0.3

php php 5.1.1

php php 4.1.0

php php 4.1.1

php php 4.3.1

php php 4.3.10

php php 4.3.7

php php 4.3.8

php php 4.4.5

php php 4.4.6

php php 5.0.1

php php 5.0

php php 5.1.0

php php 5.1.6

php php 5.2.0

php php 5.2.1

php php 4.0.6

php php 4.2.1

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 4.4.1

php php 4.4.2

php php 5.0.4

php php 5.0.5

php php 5.1.2

php php 5.1.3

php php 4.3.6

php php 4.4.3

php php 4.4.4

php php 5.1.4

php php 5.1.5

Exploits

source: wwwsecurityfocuscom/bid/23145/info PHP is prone to an email-header-injection vulnerability because it fails to properly sanitize user-supplied input when constructing email messages Exploiting this issue allows a malicious user to create arbitrary email headers, and then create and transmit spam messages from the affected comput ...