Vulnerability identifier: #VU110462
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1, 4.1.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.4, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 5, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2
External links
https:ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
https://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
https://osvdb.org/32764
https://osvdb.org/32765
https://rhn.redhat.com/errata/RHSA-2007-0089.html
https://secunia.com/advisories/24089
https://secunia.com/advisories/24195
https://secunia.com/advisories/24217
https://secunia.com/advisories/24236
https://secunia.com/advisories/24248
https://secunia.com/advisories/24284
https://secunia.com/advisories/24295
https://secunia.com/advisories/24322
https://secunia.com/advisories/24419
https://secunia.com/advisories/24421
https://secunia.com/advisories/24432
https://secunia.com/advisories/24514
https://secunia.com/advisories/24606
https://secunia.com/advisories/24642
https://security.gentoo.org/glsa/glsa-200703-21.xml
https://support.avaya.com/elmodocs2/security/ASA-2007-101.htm
https://support.avaya.com/elmodocs2/security/ASA-2007-136.htm
https://www.mandriva.com/security/advisories?name=MDKSA-2007:048
https://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
https://www.php.net/ChangeLog-5.php#5.2.1
https://www.php.net/releases/5_2_1.php
https://www.redhat.com/support/errata/RHSA-2007-0076.html
https://www.redhat.com/support/errata/RHSA-2007-0081.html
https://www.redhat.com/support/errata/RHSA-2007-0082.html
https://www.redhat.com/support/errata/RHSA-2007-0088.html
https://www.securityfocus.com/archive/1/461462/100/0/threaded
https://www.securityfocus.com/bid/22496
https://www.securitytracker.com/id?1017671
https://www.trustix.org/errata/2007/0009/
https://www.ubuntu.com/usn/usn-424-1
https://www.ubuntu.com/usn/usn-424-2
https://www.us.debian.org/security/2007/dsa-1264
https://www.vupen.com/english/advisories/2007/0546
https://issues.rpath.com/browse/RPL-1088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9722
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.