SB2017101145 - Multiple vulnerabilities in PHP



SB2017101145 - Multiple vulnerabilities in PHP

Published: October 11, 2017 Updated: June 14, 2025

Security Bulletin ID SB2017101145
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2007-1710)

The vulnerability allows a local user to read and manipulate data.

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.


2) Input validation error (CVE-ID: CVE-2007-1286)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.


Remediation

Install update from vendor's website.

References