CVE-2007-4657
Published: 4 September 2007
Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.
Notes
Author | Note |
---|---|
kees | http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667 201-strspn-oob-read.patch |
Priority
Status
Package | Release | Status |
---|---|---|
php4 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
hardy |
Does not exist
|
|
intrepid |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
upstream |
Released
(4.4.8)
|
|
Patches: upstream: http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667 |
||
php5 Launchpad, Ubuntu, Debian |
dapper |
Released
(5.1.2-1ubuntu3.10)
|
edgy |
Released
(5.1.6-1ubuntu2.7)
|
|
feisty |
Released
(5.2.1-0ubuntu1.5)
|
|
gutsy |
Released
(5.2.3-1ubuntu6.1)
|
|
hardy |
Not vulnerable
(5.2.4-2ubuntu3)
|
|
intrepid |
Not vulnerable
(5.2.4-2ubuntu3)
|
|
jaunty |
Not vulnerable
(5.2.4-2ubuntu3)
|
|
karmic |
Not vulnerable
(5.2.4-2ubuntu3)
|
|
upstream |
Released
(5.2.4)
|