Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-4657

Published: 4 September 2007

Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.

Notes

AuthorNote
kees
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667
201-strspn-oob-read.patch

Priority

Medium

Status

Package Release Status
php4
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
edgy Ignored
(end of life, was needed)
feisty Does not exist

gutsy Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream
Released (4.4.8)
Patches:
upstream: http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667
php5
Launchpad, Ubuntu, Debian
dapper
Released (5.1.2-1ubuntu3.10)
edgy
Released (5.1.6-1ubuntu2.7)
feisty
Released (5.2.1-0ubuntu1.5)
gutsy
Released (5.2.3-1ubuntu6.1)
hardy Not vulnerable
(5.2.4-2ubuntu3)
intrepid Not vulnerable
(5.2.4-2ubuntu3)
jaunty Not vulnerable
(5.2.4-2ubuntu3)
karmic Not vulnerable
(5.2.4-2ubuntu3)
upstream
Released (5.2.4)