Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU110425
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2007-1710
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.4.4 - 5.2.1
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
https://secunia.com/advisories/25423
https://secunia.com/advisories/25850
https://www.vupen.com/english/advisories/2007/1991
https://www.vupen.com/english/advisories/2007/2374
https://www.exploit-db.com/exploits/3573
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110455
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2007-1286
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.4 - 4.4.4
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
https://rhn.redhat.com/errata/RHSA-2007-0154.html
https://rhn.redhat.com/errata/RHSA-2007-0155.html
https://rhn.redhat.com/errata/RHSA-2007-0163.html
https://secunia.com/advisories/24419
https://secunia.com/advisories/24606
https://secunia.com/advisories/24910
https://secunia.com/advisories/24924
https://secunia.com/advisories/24941
https://secunia.com/advisories/24945
https://secunia.com/advisories/25025
https://secunia.com/advisories/25062
https://secunia.com/advisories/25423
https://secunia.com/advisories/25445
https://secunia.com/advisories/25850
https://security.gentoo.org/glsa/glsa-200703-21.xml
https://security.gentoo.org/glsa/glsa-200705-19.xml
https://www.debian.org/security/2007/dsa-1282
https://www.debian.org/security/2007/dsa-1283
https://www.mandriva.com/security/advisories?name=MDKSA-2007:087
https://www.mandriva.com/security/advisories?name=MDKSA-2007:088
https://www.osvdb.org/32771
https://www.php-security.org/MOPB/MOPB-04-2007.html
https://www.securityfocus.com/archive/1/466166/100/0/threaded
https://www.securityfocus.com/bid/22765
https://www.trustix.org/errata/2007/0009/
https://www.vupen.com/english/advisories/2007/1991
https://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/32796
https://issues.rpath.com/browse/RPL-1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.