2.1
CVSSv2

CVE-2007-6039

Published: 20/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

PHP 5.2.5 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.

Vulnerable Product Search on Vulmon Subscribe to Product

php php

Vendor Advisories

Debian Bug report logs - #453295 CVE-2007-6039: possible DoS Package: php5-common; Maintainer for php5-common is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5-common is src:php5 (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 28 Nov 2007 12 ...

Exploits

source: wwwsecurityfocuscom/bid/26428/info PHP is prone to multiple denial-of-service vulnerabilities because it fails to perform adequate boundary checks on user-supplied input Attackers can exploit these issues to cause denial-of-service conditions Given the nature of these issues, attackers may also be able to execute arbitrary code ...