Risk | High |
Patch available | YES |
Number of vulnerabilities | 78 |
CVE-ID | CVE-2010-4409 CVE-2009-5016 CVE-2009-4142 CVE-2009-4143 CVE-2009-2626 CVE-2009-4018 CVE-2009-3557 CVE-2009-3558 CVE-2009-3291 CVE-2009-3292 CVE-2009-3293 CVE-2008-7068 CVE-2008-5814 CVE-2008-4107 CVE-2007-4658 CVE-2007-4652 CVE-2007-3799 CVE-2007-2844 CVE-2007-2727 CVE-2007-2509 CVE-2007-2510 CVE-2007-2511 CVE-2007-1883 CVE-2007-1884 CVE-2007-1885 CVE-2007-1888 CVE-2007-1890 CVE-2007-1001 CVE-2007-1835 CVE-2007-1825 CVE-2007-1777 CVE-2007-1717 CVE-2007-1718 CVE-2007-1700 CVE-2007-1582 CVE-2007-1583 CVE-2007-1460 CVE-2007-1461 CVE-2007-1396 CVE-2007-1376 CVE-2007-1378 CVE-2007-1379 CVE-2007-1380 CVE-2007-0905 CVE-2007-0906 CVE-2007-0907 CVE-2007-0909 CVE-2007-0910 CVE-2006-4812 CVE-2006-5178 CVE-2006-4625 CVE-2006-4433 CVE-2006-4020 CVE-2006-3011 CVE-2006-1494 CVE-2006-1608 CVE-2006-1490 CVE-2006-1015 CVE-2006-1017 CVE-2005-3883 CVE-2005-3388 CVE-2005-3389 CVE-2005-3390 CVE-2005-3391 CVE-2005-3392 CVE-2005-3319 CVE-2004-1019 CVE-2004-1065 CVE-2004-0595 CVE-2003-0860 CVE-2003-0861 CVE-2003-0166 CVE-2002-1396 CVE-2002-1783 CVE-2002-2215 CVE-2002-2309 CVE-2002-0986 CVE-2002-0484 |
CWE-ID | CWE-20 CWE-79 CWE-264 CWE-59 CWE-119 CWE-122 CWE-94 CWE-362 CWE-22 CWE-399 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #3 is available. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #16 is available. Public exploit code for vulnerability #17 is available. Public exploit code for vulnerability #27 is available. Public exploit code for vulnerability #28 is available. Public exploit code for vulnerability #29 is available. Public exploit code for vulnerability #30 is available. Public exploit code for vulnerability #31 is available. Public exploit code for vulnerability #33 is available. Public exploit code for vulnerability #34 is available. Public exploit code for vulnerability #35 is available. Public exploit code for vulnerability #36 is available. Public exploit code for vulnerability #40 is available. Public exploit code for vulnerability #43 is available. Public exploit code for vulnerability #49 is available. Public exploit code for vulnerability #51 is available. Public exploit code for vulnerability #53 is available. Public exploit code for vulnerability #55 is available. Public exploit code for vulnerability #56 is available. Public exploit code for vulnerability #57 is available. Public exploit code for vulnerability #58 is available. Public exploit code for vulnerability #61 is available. Public exploit code for vulnerability #63 is available. Public exploit code for vulnerability #69 is available. Public exploit code for vulnerability #72 is available. Public exploit code for vulnerability #76 is available. Public exploit code for vulnerability #78 is available. |
Vulnerable software |
PHP Universal components / Libraries / Scripting languages |
Vendor | PHP Group |
Security Bulletin
This security bulletin contains information about 78 vulnerabilities.
EUVDB-ID: #VU110280
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2010-4409
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.3.2
CPE2.3https://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
https://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html
https://secunia.com/advisories/42812
https://secunia.com/advisories/47674
https://support.apple.com/kb/HT4581
https://svn.php.net/viewvc/php/php-src/trunk/ext/intl/formatter/formatter_attr.c?r1=305571&r2=305570&pathrev=305571
https://svn.php.net/viewvc?view=revision&revision=305571
https://www.exploit-db.com/exploits/15722
https://www.kb.cert.org/vuls/id/479900
https://www.mandriva.com/security/advisories?name=MDVSA-2010:254
https://www.mandriva.com/security/advisories?name=MDVSA-2010:255
https://www.php.net/ChangeLog-5.php
https://www.securityfocus.com/archive/1/515142/100/0/threaded
https://www.securityfocus.com/bid/45119
https://www.ubuntu.com/usn/USN-1042-1
https://www.vupen.com/english/advisories/2011/0020
https://www.vupen.com/english/advisories/2011/0021
https://www.vupen.com/english/advisories/2011/0077
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110281
Risk: Medium
CVSSv4.0: N/A
CVE-ID: CVE-2009-5016
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.1
CPE2.3https://bugs.php.net/bug.php?id=49687
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
https://secunia.com/advisories/42410
https://secunia.com/advisories/42812
https://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
https://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
https://www.redhat.com/support/errata/RHSA-2010-0919.html
https://www.redhat.com/support/errata/RHSA-2011-0195.html
https://www.securityfocus.com/bid/44889
https://www.ubuntu.com/usn/USN-1042-1
https://www.vupen.com/english/advisories/2010/3081
https://www.vupen.com/english/advisories/2011/0020
https://www.vupen.com/english/advisories/2011/0021
https://www.vupen.com/english/advisories/2011/0077
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110314
Risk: Medium
CVSSv4.0: N/A
CVE-ID: CVE-2009-4142
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: Yes
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. The vulnerability allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.10
CPE2.3https://bugs.php.net/bug.php?id=49785
https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://secunia.com/advisories/37821
https://secunia.com/advisories/38648
https://secunia.com/advisories/40262
https://securitytracker.com/id?1023372
https://support.apple.com/kb/HT4077
https://www.debian.org/security/2010/dsa-2001
https://www.php.net/ChangeLog-5.php
https://www.php.net/releases/5_2_12.php
https://www.securityfocus.com/bid/37389
https://www.vupen.com/english/advisories/2009/3593
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7085
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110315
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2009-4143
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.10
CPE2.3https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://secunia.com/advisories/37821
https://secunia.com/advisories/38648
https://secunia.com/advisories/40262
https://secunia.com/advisories/41480
https://secunia.com/advisories/41490
https://support.apple.com/kb/HT4077
https://www.debian.org/security/2010/dsa-2001
https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
https://www.mandriva.com/security/advisories?name=MDVSA-2010:045
https://www.php.net/ChangeLog-5.php
https://www.php.net/releases/5_2_12.php
https://www.securityfocus.com/bid/37390
https://www.vupen.com/english/advisories/2009/3593
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7439
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110316
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2009-2626
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read memory contents or crash the application.
The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.3
CPE2.3https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540605
https://secunia.com/advisories/37482
https://securityreason.com/achievement_securityalert/65
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/Zend/zend_ini.c?r1=272370&r2=284156
https://www.debian.org/security/2009/dsa-1940
https://www.securityfocus.com/bid/36009
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110317
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2009-4018
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.3
CPE2.3https://bugs.php.net/bug.php?id=49026
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://marc.info/?l=oss-security&m=125886770008678&w=2
https://marc.info/?l=oss-security&m=125897935330618&w=2
https://secunia.com/advisories/40262
https://secunia.com/advisories/41480
https://secunia.com/advisories/41490
https://svn.php.net/viewvc/?view=revision&revision=286360
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360
https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
https://www.mandriva.com/security/advisories?name=MDVSA-2009:303
https://www.openwall.com/lists/oss-security/2009/11/23/15
https://www.php.net/ChangeLog-5.php
https://www.securityfocus.com/bid/37138
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7256
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110319
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2009-3557
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to corrupt data.
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.3
CPE2.3https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://news.php.net/php.announce/79
https://secunia.com/advisories/37412
https://secunia.com/advisories/37821
https://secunia.com/advisories/40262
https://securityreason.com/securityalert/6601
https://support.apple.com/kb/HT4077
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log
https://svn.php.net/viewvc?view=revision&revision=288945
https://www.mandriva.com/security/advisories?name=MDVSA-2009:285
https://www.mandriva.com/security/advisories?name=MDVSA-2009:302
https://www.mandriva.com/security/advisories?name=MDVSA-2009:303
https://www.openwall.com/lists/oss-security/2009/11/20/2
https://www.openwall.com/lists/oss-security/2009/11/20/3
https://www.openwall.com/lists/oss-security/2009/11/20/5
https://www.php.net/ChangeLog-5.php
https://www.php.net/releases/5_2_12.php
https://www.php.net/releases/5_3_1.php
https://www.vupen.com/english/advisories/2009/3593
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110320
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2009-3558
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file. Access Complexity selected medium according to the information from X-force link regarding enabling "open_basedir" option. http://xforce.iss.net/xforce/xfdb/53568
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.3
CPE2.3https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
https://news.php.net/php.announce/79
https://secunia.com/advisories/37412
https://secunia.com/advisories/37821
https://securityreason.com/securityalert/6600
https://support.apple.com/kb/HT4077
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/posix/posix.c?view=log
https://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/posix/posix.c?view=log
https://svn.php.net/viewvc?view=revision&revision=288943
https://www.mandriva.com/security/advisories?name=MDVSA-2009:285
https://www.mandriva.com/security/advisories?name=MDVSA-2009:302
https://www.mandriva.com/security/advisories?name=MDVSA-2009:303
https://www.openwall.com/lists/oss-security/2009/11/20/2
https://www.openwall.com/lists/oss-security/2009/11/20/3
https://www.openwall.com/lists/oss-security/2009/11/20/5
https://www.php.net/ChangeLog-5.php
https://www.php.net/releases/5_2_12.php
https://www.php.net/releases/5_3_1.php
https://www.vupen.com/english/advisories/2009/3593
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110321
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2009-3291
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.9
CPE2.3https://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://marc.info/?l=bugtraq&m=130497311408250&w=2
https://secunia.com/advisories/36791
https://secunia.com/advisories/37482
https://secunia.com/advisories/40262
https://support.apple.com/kb/HT3937
https://www.debian.org/security/2009/dsa-1940
https://www.osvdb.org/58185
https://www.php.net/ChangeLog-5.php#5.2.11
https://www.php.net/releases/5_2_11.php
https://www.securitytracker.com/id?1022914
https://www.vupen.com/english/advisories/2009/3184
https://exchange.xforce.ibmcloud.com/vulnerabilities/53334
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10438
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7394
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110322
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2009-3292
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.9
CPE2.3https://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://marc.info/?l=bugtraq&m=130497311408250&w=2
https://news.php.net/php.announce/79
https://secunia.com/advisories/36791
https://secunia.com/advisories/37412
https://secunia.com/advisories/37482
https://secunia.com/advisories/40262
https://support.apple.com/kb/HT3937
https://www.debian.org/security/2009/dsa-1940
https://www.mandriva.com/security/advisories?name=MDVSA-2009:302
https://www.openwall.com/lists/oss-security/2009/11/20/2
https://www.openwall.com/lists/oss-security/2009/11/20/3
https://www.osvdb.org/58186
https://www.php.net/ChangeLog-5.php
https://www.php.net/ChangeLog-5.php#5.2.11
https://www.php.net/releases/5_2_11.php
https://www.php.net/releases/5_3_1.php
https://www.securitytracker.com/id?1022914
https://www.vupen.com/english/advisories/2009/3184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7652
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9982
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110323
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2009-3293
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index."
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.9
CPE2.3https://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://marc.info/?l=bugtraq&m=130497311408250&w=2
https://secunia.com/advisories/36791
https://secunia.com/advisories/40262
https://support.apple.com/kb/HT3937
https://www.osvdb.org/58187
https://www.php.net/ChangeLog-5.php#5.2.11
https://www.php.net/releases/5_2_11.php
https://www.securitytracker.com/id?1022914
https://www.vupen.com/english/advisories/2009/3184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7047
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110324
Risk: Medium
CVSSv4.0: N/A
CVE-ID: CVE-2008-7068
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (file truncation) via a key with the NULL byte.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.6
CPE2.3https://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1313&r2=1.2027.2.547.2.1314&
https://securityreason.com/achievement_securityalert/58
https://www.osvdb.org/52206
https://www.securityfocus.com/archive/1/498746/100/0/threaded
https://www.securityfocus.com/archive/1/498981/100/0/threaded
https://www.securityfocus.com/archive/1/498982/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/47316
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110330
Risk: Low
CVSSv4.0: N/A
CVE-ID: CVE-2008-5814
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in PHP, possibly 5.2.7 and earlier, when display_errors is enabled,. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.6
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
https://jvn.jp/en/jp/JVN50327700/index.html
https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000084.html
https://marc.info/?l=bugtraq&m=124277349419254&w=2
https://secunia.com/advisories/34830
https://secunia.com/advisories/34933
https://secunia.com/advisories/35003
https://secunia.com/advisories/35007
https://secunia.com/advisories/35108
https://www.debian.org/security/2009/dsa-1789
https://www.redhat.com/support/errata/RHSA-2009-0350.html
https://www.ubuntu.com/usn/USN-761-2
https://www.vupen.com/english/advisories/2009/1338
https://exchange.xforce.ibmcloud.com/vulnerabilities/47496
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10501
https://usn.ubuntu.com/761-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110336
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2008-4107
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce cryptographically strong random numbers, which allows attackers to leverage exposures in products that rely on these functions for security-relevant functionality, as demonstrated by the password-reset functionality in Joomla! 1.5.x and WordPress before 2.6.2, a different vulnerability than CVE-2008-2107, CVE-2008-2108, and CVE-2008-4102. Download the latest version of PHP to fix this vulnerability: http://www.php.net/downloads.php
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.4
CPE2.3https://marc.info/?l=oss-security&m=122152830017099&w=2
https://osvdb.org/48700
https://secunia.com/advisories/31737
https://secunia.com/advisories/31870
https://securityreason.com/securityalert/4271
https://securitytracker.com/id?1020869
https://wordpress.org/development/2008/09/wordpress-262/
https://www.openwall.com/lists/oss-security/2008/09/11/6
https://www.securityfocus.com/archive/1/496237/100/0/threaded
https://www.securityfocus.com/archive/1/496287/100/0/threaded
https://www.securityfocus.com/bid/31115
https://www.sektioneins.de/advisories/SE-2008-02.txt
https://www.sektioneins.de/advisories/SE-2008-04.txt
https://www.sektioneins.de/advisories/SE-2008-05.txt
https://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/
https://www.vupen.com/english/advisories/2008/2553
https://exchange.xforce.ibmcloud.com/vulnerabilities/45956
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110369
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-4658
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.14
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
https://rhn.redhat.com/errata/RHSA-2007-0889.html
https://secunia.com/advisories/26642
https://secunia.com/advisories/26822
https://secunia.com/advisories/26838
https://secunia.com/advisories/26871
https://secunia.com/advisories/26895
https://secunia.com/advisories/26930
https://secunia.com/advisories/26967
https://secunia.com/advisories/27102
https://secunia.com/advisories/27377
https://secunia.com/advisories/27545
https://secunia.com/advisories/27864
https://secunia.com/advisories/28249
https://secunia.com/advisories/28658
https://secunia.com/advisories/28936
https://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
https://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
https://www.debian.org/security/2008/dsa-1444
https://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
https://www.mandriva.com/security/advisories?name=MDKSA-2007:187
https://www.php.net/ChangeLog-4.php
https://www.php.net/ChangeLog-5.php#5.2.4
https://www.php.net/releases/4_4_8.php
https://www.php.net/releases/5_2_4.php
https://www.redhat.com/support/errata/RHSA-2007-0890.html
https://www.redhat.com/support/errata/RHSA-2007-0891.html
https://www.trustix.org/errata/2007/0026/
https://www.ubuntu.com/usn/usn-549-2
https://www.vupen.com/english/advisories/2007/3023
https://www.vupen.com/english/advisories/2008/0059
https://exchange.xforce.ibmcloud.com/vulnerabilities/36377
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://launchpad.net/bugs/173043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10363
https://usn.ubuntu.com/549-1/
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110375
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2007-4652
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to read and manipulate data.
The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 1.0 - 5.2.2
CPE2.3https://secunia.com/advisories/26642
https://secunia.com/advisories/26822
https://secunia.com/advisories/26838
https://secunia.com/advisories/27102
https://secunia.com/advisories/27377
https://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
https://www.php.net/ChangeLog-5.php#5.2.4
https://www.php.net/releases/5_2_4.php
https://www.trustix.org/errata/2007/0026/
https://www.vupen.com/english/advisories/2007/3023
https://exchange.xforce.ibmcloud.com/vulnerabilities/36387
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110388
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2007-3799
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to corrupt data.
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.14
CPE2.3https://docs.info.apple.com/article.html?artnum=307562
https://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
https://osvdb.org/36855
https://rhn.redhat.com/errata/RHSA-2007-0889.html
https://secunia.com/advisories/26871
https://secunia.com/advisories/26895
https://secunia.com/advisories/26930
https://secunia.com/advisories/26967
https://secunia.com/advisories/27351
https://secunia.com/advisories/27377
https://secunia.com/advisories/27545
https://secunia.com/advisories/27864
https://secunia.com/advisories/28249
https://secunia.com/advisories/29420
https://secunia.com/advisories/30288
https://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
https://www.debian.org/security/2008/dsa-1444
https://www.debian.org/security/2008/dsa-1578
https://www.mandriva.com/security/advisories?name=MDKSA-2007:187
https://www.novell.com/linux/security/advisories/2007_15_sr.html
https://www.php-security.org/MOPB/PMOPB-46-2007.html
https://www.redhat.com/support/errata/RHSA-2007-0888.html
https://www.redhat.com/support/errata/RHSA-2007-0890.html
https://www.redhat.com/support/errata/RHSA-2007-0891.html
https://www.securityfocus.com/bid/24268
https://www.ubuntu.com/usn/usn-549-2
https://www.vupen.com/english/advisories/2008/0924/references
https://issues.rpath.com/browse/RPL-1693
https://launchpad.net/bugs/173043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9792
https://usn.ubuntu.com/549-1/
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110396
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2007-2844
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2
CPE2.3https://blog.php-security.org/archives/82-Suhosin-0.9.20-and-crypt-Thread-Safety-Vulnerability.html
https://osvdb.org/36088
https://secunia.com/advisories/25434
https://www.securityfocus.com/bid/24109
https://exchange.xforce.ibmcloud.com/vulnerabilities/34601
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110399
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2007-2727
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.1 - 4.3.11
CPE2.3https://blog.php-security.org/archives/80-Watching-the-PHP-CVS.html
https://www.fortheloot.com/public/mcrypt.patch
https://bugs.php.net/bug.php?id=40999
https://cvs.php.net/viewvc.cgi/php-src/ext/mcrypt/mcrypt.c?r1=1.91.2.3.2.9&r2=1.91.2.3.2.10
https://www.php.net/ChangeLog-5.php
https://www.securityfocus.com/bid/23984
https://www.mandriva.com/security/advisories?name=MDKSA-2007:187
https://www.novell.com/linux/security/advisories/2007_15_sr.html
https://secunia.com/advisories/26895
https://osvdb.org/36087
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110402
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2007-2509
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to corrupt data.
CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.1
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
https://rhn.redhat.com/errata/RHSA-2007-0889.html
https://secunia.com/advisories/25187
https://secunia.com/advisories/25191
https://secunia.com/advisories/25255
https://secunia.com/advisories/25318
https://secunia.com/advisories/25365
https://secunia.com/advisories/25372
https://secunia.com/advisories/25445
https://secunia.com/advisories/25660
https://secunia.com/advisories/26048
https://secunia.com/advisories/26967
https://secunia.com/advisories/27351
https://security.gentoo.org/glsa/glsa-200705-19.xml
https://securityreason.com/securityalert/2672
https://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
https://us2.php.net/releases/4_4_7.php
https://us2.php.net/releases/5_2_2.php
https://www.debian.org/security/2007/dsa-1295
https://www.debian.org/security/2007/dsa-1296
https://www.mandriva.com/security/advisories?name=MDKSA-2007:102
https://www.mandriva.com/security/advisories?name=MDKSA-2007:103
https://www.redhat.com/support/errata/RHSA-2007-0349.html
https://www.redhat.com/support/errata/RHSA-2007-0355.html
https://www.redhat.com/support/errata/RHSA-2007-0888.html
https://www.securityfocus.com/archive/1/463596/100/0/threaded
https://www.securityfocus.com/bid/23813
https://www.securityfocus.com/bid/23818
https://www.securitytracker.com/id?1018022
https://www.trustix.org/errata/2007/0017/
https://www.ubuntu.com/usn/usn-462-1
https://www.vupen.com/english/advisories/2007/2187
https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
https://rhn.redhat.com/errata/RHSA-2007-0348.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110403
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-2510
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.1
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
https://osvdb.org/34675
https://secunia.com/advisories/25187
https://secunia.com/advisories/25191
https://secunia.com/advisories/25255
https://secunia.com/advisories/25318
https://secunia.com/advisories/25372
https://secunia.com/advisories/25445
https://secunia.com/advisories/26048
https://security.gentoo.org/glsa/glsa-200705-19.xml
https://us2.php.net/releases/5_2_2.php
https://viewcvs.php.net/viewvc.cgi/php-src/ext/soap/php_http.c?r1=1.77.2.11.2.5&r2=1.77.2.11.2.6
https://www.debian.org/security/2007/dsa-1295
https://www.mandriva.com/security/advisories?name=MDKSA-2007:102
https://www.redhat.com/support/errata/RHSA-2007-0355.html
https://www.securityfocus.com/bid/23813
https://www.securityfocus.com/bid/24034
https://www.securitytracker.com/id?1018023
https://www.trustix.org/errata/2007/0017/
https://www.ubuntu.com/usn/usn-462-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10715
https://rhn.redhat.com/errata/RHSA-2007-0348.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110404
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2007-2511
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.0.0
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
https://osvdb.org/34676
https://secunia.com/advisories/25191
https://secunia.com/advisories/25255
https://secunia.com/advisories/25372
https://secunia.com/advisories/25445
https://secunia.com/advisories/26048
https://security.gentoo.org/glsa/glsa-200705-19.xml
https://us2.php.net/releases/5_2_2.php
https://viewcvs.php.net/viewvc.cgi/php-src/ext/standard/user_filters.c?r1=1.31.2.4.2.5&r2=1.31.2.4.2.6
https://www.mandriva.com/security/advisories?name=MDKSA-2007:102
https://www.trustix.org/errata/2007/0017/
https://www.ubuntu.com/usn/usn-462-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110407
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-1883
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.1
CPE2.3https://secunia.com/advisories/24542
https://secunia.com/advisories/27102
https://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
https://www.php-security.org/MOPB/MOPB-37-2007.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/33750
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110408
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-1884
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary memory location.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 4.4.4
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
https://secunia.com/advisories/25423
https://secunia.com/advisories/25850
https://www.osvdb.org/33955
https://www.osvdb.org/34767
https://www.php.net/releases/5_2_1.php
https://www.php-security.org/MOPB/MOPB-38-2007.html
https://www.securityfocus.com/bid/23219
https://www.vupen.com/english/advisories/2007/1991
https://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/33755
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110409
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-1885
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
https://secunia.com/advisories/25423
https://secunia.com/advisories/25850
https://www.php.net/releases/5_2_1.php
https://www.php-security.org/MOPB/MOPB-39-2007.html
https://www.securityfocus.com/bid/23233
https://www.vupen.com/english/advisories/2007/1991
https://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/33767
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110412
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-1888
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.4
CPE2.3https://osvdb.org/39177
https://secunia.com/advisories/25057
https://www.attrition.org/pipermail/vim/2007-April/001540.html
https://www.mandriva.com/security/advisories?name=MDKSA-2007:091
https://www.php-security.org/MOPB/MOPB-41-2007.html
https://www.sqlite.org/cvstrac/rlog?f=sqlite/src/encode.c
https://www.ubuntu.com/usn/usn-455-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/38518
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110414
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2007-1890
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2
CPE2.3https://www.php-security.org/MOPB/MOPB-43-2007.html
https://www.securityfocus.com/bid/23236
https://exchange.xforce.ibmcloud.com/vulnerabilities/33775
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110415
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2007-1001
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2.1
CPE2.3https://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1
https://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?revision=1.2.4.1.8.1&view=markup
https://docs.info.apple.com/article.html?artnum=306172
https://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.html
https://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
https://rhn.redhat.com/errata/RHSA-2007-0155.html
https://secunia.com/advisories/24814
https://secunia.com/advisories/24909
https://secunia.com/advisories/24924
https://secunia.com/advisories/24945
https://secunia.com/advisories/24965
https://secunia.com/advisories/25056
https://secunia.com/advisories/25151
https://secunia.com/advisories/25445
https://secunia.com/advisories/26235
https://security.gentoo.org/glsa/glsa-200705-19.xml
https://us2.php.net/releases/4_4_7.php
https://us2.php.net/releases/5_2_2.php
https://www.mandriva.com/security/advisories?name=MDKSA-2007:087
https://www.mandriva.com/security/advisories?name=MDKSA-2007:088
https://www.mandriva.com/security/advisories?name=MDKSA-2007:089
https://www.mandriva.com/security/advisories?name=MDKSA-2007:090
https://www.novell.com/linux/security/advisories/2007_32_php.html
https://www.redhat.com/support/errata/RHSA-2007-0153.html
https://www.redhat.com/support/errata/RHSA-2007-0162.html
https://www.securityfocus.com/archive/1/464957/100/0/threaded
https://www.securityfocus.com/archive/1/466166/100/0/threaded
https://www.securityfocus.com/bid/23357
https://www.securityfocus.com/bid/25159
https://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.470053
https://www.vupen.com/english/advisories/2007/1269
https://www.vupen.com/english/advisories/2007/2732
https://exchange.xforce.ibmcloud.com/vulnerabilities/33453
https://issues.rpath.com/browse/RPL-1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110416
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2007-1835
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to read and manipulate data.
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.2
CPE2.3https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
https://secunia.com/advisories/25423
https://secunia.com/advisories/25850
https://www.php-security.org/MOPB/MOPB-36-2007.html
https://www.securityfocus.com/bid/23183
https://www.vupen.com/english/advisories/2007/1991
https://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/33550
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110418
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2007-1825
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 4.0.0 - 5.1.6
CPE2.3https://www.php-security.org/MOPB/MOPB-40-2007.html
https://www.securityfocus.com/bid/23234
https://exchange.xforce.ibmcloud.com/vulnerabilities/33534
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10377
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110419
Risk: Medium
CVSSv4.0: N/A
CVE-ID: CVE-2007-1777
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5. A remote attacker can use a ZIP archive that contains an entry with a length value of 0xffffffff to trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 3.0 - 4.4.4
CPE2.3https://secunia.com/advisories/25025
https://secunia.com/advisories/25062
https://www.debian.org/security/2007/dsa-1282
https://www.debian.org/security/2007/dsa-1283
https://www.mandriva.com/security/advisories?name=MDVSA-2008:130
https://www.php-security.org/MOPB/MOPB-35-2007.html
https://www.securityfocus.com/bid/23169
https://exchange.xforce.ibmcloud.com/vulnerabilities/33652
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU110420
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2007-1717
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to corrupt data.
The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('