SB2018101625 - Multiple vulnerabilities in PHP



SB2018101625 - Multiple vulnerabilities in PHP

Published: October 16, 2018 Updated: June 13, 2025

Security Bulletin ID SB2018101625
Severity
Medium
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 88% Low 13%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2007-1711)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).


2) Input validation error (CVE-ID: CVE-2007-1475)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument. Successful exploitation requires that the Interbase extension is installed.


3) Input validation error (CVE-ID: CVE-2007-1484)

The vulnerability allows a local user to read and manipulate data.

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.


4) Input validation error (CVE-ID: CVE-2007-1412)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.


5) Buffer overflow (CVE-ID: CVE-2007-1413)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id). Failed exploit attempts will likely cause a denial of serivce on the webserver.


6) Input validation error (CVE-ID: CVE-2007-1411)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.


7) Uncontrolled Recursion (CVE-ID: CVE-2007-1285)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.


8) Cross-site scripting (CVE-ID: CVE-2007-1287)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. The vulnerability allows remote attackers to conduct cross-site scripting (XSS) attacks via GET, POST, or COOKIE array values, which are not escaped in the phpinfo output, as originally fixed for CVE-2005-3388.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.

References