Input validation error in PHP - CVE-2007-1824
Published: July 29, 2017 / Updated: June 8, 2025
Vulnerability identifier: #VU110417
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2007-1824
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: PHP Group
Affected software:
PHP
PHP
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
How to mitigate CVE-2007-1824
Install update from vendor's website.
Sources
- http://secunia.com/advisories/25056
- http://secunia.com/advisories/25057
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1283
- http://www.novell.com/linux/security/advisories/2007_32_php.html
- http://www.php-security.org/MOPB/MOPB-42-2007.html
- http://www.securityfocus.com/bid/23237
- http://www.ubuntu.com/usn/usn-455-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33729