Buffer overflow in PHP - CVE-2007-4662
Published: October 3, 2018 / Updated: June 8, 2025
Vulnerability identifier: #VU110373
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2007-4662
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: PHP Group
Affected software:
PHP
PHP
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.
How to mitigate CVE-2007-4662
Install update from vendor's website.
Sources
- http://secunia.com/advisories/26642
- http://secunia.com/advisories/26822
- http://secunia.com/advisories/26838
- http://secunia.com/advisories/27102
- http://secunia.com/advisories/27377
- http://secunia.com/advisories/27864
- http://secunia.com/advisories/28249
- http://www.debian.org/security/2008/dsa-1444
- http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
- http://www.php.net/ChangeLog-5.php#5.2.4
- http://www.php.net/releases/5_2_4.php
- http://www.trustix.org/errata/2007/0026/
- http://www.ubuntu.com/usn/usn-549-2
- http://www.vupen.com/english/advisories/2007/3023
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36390
- https://issues.rpath.com/browse/RPL-1693
- https://issues.rpath.com/browse/RPL-1702
- https://launchpad.net/bugs/173043
- https://usn.ubuntu.com/549-1/