#VU110462 Input validation error in PHP - CVE-2007-0909


| Updated: 2025-06-08

Vulnerability identifier: #VU110462

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2007-0909

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
PHP
Universal components / Libraries / Scripting languages

Vendor: PHP Group

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.

Mitigation
Install update from vendor's website.

Vulnerable software versions

PHP: 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1, 4.1.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.4, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 5, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2


External links
https:ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
https://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
https://osvdb.org/32764
https://osvdb.org/32765
https://rhn.redhat.com/errata/RHSA-2007-0089.html
https://secunia.com/advisories/24089
https://secunia.com/advisories/24195
https://secunia.com/advisories/24217
https://secunia.com/advisories/24236
https://secunia.com/advisories/24248
https://secunia.com/advisories/24284
https://secunia.com/advisories/24295
https://secunia.com/advisories/24322
https://secunia.com/advisories/24419
https://secunia.com/advisories/24421
https://secunia.com/advisories/24432
https://secunia.com/advisories/24514
https://secunia.com/advisories/24606
https://secunia.com/advisories/24642
https://security.gentoo.org/glsa/glsa-200703-21.xml
https://support.avaya.com/elmodocs2/security/ASA-2007-101.htm
https://support.avaya.com/elmodocs2/security/ASA-2007-136.htm
https://www.mandriva.com/security/advisories?name=MDKSA-2007:048
https://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
https://www.php.net/ChangeLog-5.php#5.2.1
https://www.php.net/releases/5_2_1.php
https://www.redhat.com/support/errata/RHSA-2007-0076.html
https://www.redhat.com/support/errata/RHSA-2007-0081.html
https://www.redhat.com/support/errata/RHSA-2007-0082.html
https://www.redhat.com/support/errata/RHSA-2007-0088.html
https://www.securityfocus.com/archive/1/461462/100/0/threaded
https://www.securityfocus.com/bid/22496
https://www.securitytracker.com/id?1017671
https://www.trustix.org/errata/2007/0009/
https://www.ubuntu.com/usn/usn-424-1
https://www.ubuntu.com/usn/usn-424-2
https://www.us.debian.org/security/2007/dsa-1264
https://www.vupen.com/english/advisories/2007/0546
https://issues.rpath.com/browse/RPL-1088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9722


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability