7.5
CVSSv2

CVE-2007-3294

Published: 20/06/2007 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent malicious users to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.3

Exploits

<?php //PHP 523 tidy_parse_string() & tidy_repair_string() local //buffer overflow poc (win) //rgod //site: retrogodaltervistaorg //quickly tested on xp sp2, worked both from the cli and on apache //let's have a look here: wwwgooglecom/codesearch?hl=it&q=+tidy_parse_string&sa=N if (!extension_loaded("tidy")){die("you n ...