7.5
CVSSv2

CVE-2007-1890

Published: 06/04/2007 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the msg_receive function in PHP 4 prior to 4.4.5 and PHP 5 prior to 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent malicious users to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.3

php php 4.0.7

php php 4.1.0

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 4.4.4

php php 5.0.0

php php 5.0.1

php php 5.0

php php 5.1.0

php php 5.2.0

php php 4.0.0

php php 4.0.4

php php 4.1.1

php php 4.1.2

php php 4.3.1

php php 4.3.10

php php 4.3.7

php php 4.3.8

php php 5.0.2

php php 5.0.3

php php 5.1.1

php php 5.1.2

php php 4.0.1

php php 4.0.2

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 4.4.2

php php 4.4.3

php php 5.1.5

php php 5.1.6

php php 4.0.5

php php 4.0.6

php php 4.2.0

php php 4.2.1

php php 4.3.11

php php 4.3.2

php php 4.3.9

php php 4.4.0

php php 4.4.1

php php 5.0.4

php php 5.0.5

php php 5.1.3

php php 5.1.4

Exploits

source: wwwsecurityfocuscom/bid/23236/info PHP is prone to an integer-overflow vulnerability because it fails to ensure that integer values aren't overrun Attackers may exploit this issue to cause a buffer overflow and to corrupt process memory Exploiting this issue may allow attackers to execute arbitrary machine code in the context o ...