6.4
CVSSv2

CVE-2008-7068

Published: 25/08/2009 Updated: 30/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent malicious users to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.1.0

php php 4.0.0

php php 4.0

php php 4.0.3

php php 4.0.7

php php 4.3.4

php php 4.3.3

php php 4.2.2

php php 4.3.0

php php 4.3.8

php php 4.3.9

php php 4.2.0

php php 4.0.1

php php 4.0.5

php php 4.0.4

php php 4.3.2

php php 4.3.11

php php 4.2

php php 4.4.9

php php 4.3.7

php php 4.4.4

php php 5.2.6

php php 4.0.6

php php 4.1.2

php php 4.1.1

php php 4.3.10

php php 4.3.1

php php 4.2.1

php php 4.4.8

php php 4.2.3

php php 4.4.6

php php 4.4.7

php php 4.4.2

php php 4.4.3

php php 4.0.2

php php 4.3.6

php php 4.3.5

php php 4.4.5

php php 4.4.0

php php 4.4.1

Vendor Advisories

Maksymilian Arciemowicz discovered that PHP did not properly validate arguments to the dba_replace function If a script passed untrusted input to the dba_replace function, an attacker could truncate the database This issue only applied to Ubuntu 606 LTS, 804 LTS, and 810 (CVE-2008-7068) ...