CVE-2007-4657

Published: 04 September 2007

Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.

Priority

Medium

Status

Package Release Status
php4
Launchpad, Ubuntu, Debian
Upstream
Released (4.4.8)
Patches:
Upstream: http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667
other: 201-strspn-oob-read.patch
php5
Launchpad, Ubuntu, Debian
Upstream
Released (5.2.4)

Notes

AuthorNote
kees
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667
201-strspn-oob-read.patch

References