7.5
CVSSv2

CVE-2007-1888

Published: 06/04/2007 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x up to and including 5.x and other applications, allows context-dependent malicious users to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.1

php php 4.0.5

php php 4.0.6

php php 4.0

php php 4.2.1

php php 4.2.2

php php 4.3.2

php php 4.3.3

php php 4.4.0

php php 4.4.1

php php 4.4.2

php php 5.0.0

php php 5.0.3

php php 5.0.4

php php 5.1.1

php php 5.1.2

php php 5.1.3

php php 4.0.2

php php 4.0.7

php php 4.2.3

php php 4.2

php php 4.3.4

php php 4.3.5

php php 4.4.3

php php 4.4.4

php php 5.0.5

php php 5.0

php php 5.1.4

php php 5.1.5

php php 4.0.0

php php 4.0.4

php php 4.1.2

php php 4.2.0

php php 4.3.10

php php 4.3.11

php php 4.3.8

php php 4.3.9

php php 5.0.1

php php 5.0.2

php php 5.1.0

php php 5.2.1

php php 5.4.0

php php 4.0.3

php php 4.1.0

php php 4.1.1

php php 4.3.0

php php 4.3.1

php php 4.3.6

php php 4.3.7

php php 4.4.5

php php 4.4.6

php php 5.1.6

php php 5.2.0

Vendor Advisories

Debian Bug report logs - #441233 CVE-2007-1888 possible code execution via sqlite_decode_binary Package: sqlite; Maintainer for sqlite is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for sqlite is src:sqlite (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Fri, 7 Sep 2007 15:45:04 UTC Seve ...
Stefan Esser discovered multiple vulnerabilities in the “Month of PHP bugs” ...