Vulnerability identifier: #VU110463
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1, 4.1.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.4, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 5, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6
External links
https:ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
https://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
https://osvdb.org/32763
https://rhn.redhat.com/errata/RHSA-2007-0089.html
https://secunia.com/advisories/24089
https://secunia.com/advisories/24195
https://secunia.com/advisories/24217
https://secunia.com/advisories/24236
https://secunia.com/advisories/24248
https://secunia.com/advisories/24284
https://secunia.com/advisories/24295
https://secunia.com/advisories/24322
https://secunia.com/advisories/24419
https://secunia.com/advisories/24421
https://secunia.com/advisories/24432
https://secunia.com/advisories/24514
https://secunia.com/advisories/24606
https://secunia.com/advisories/24642
https://secunia.com/advisories/24945
https://security.gentoo.org/glsa/glsa-200703-21.xml
https://support.avaya.com/elmodocs2/security/ASA-2007-101.htm
https://support.avaya.com/elmodocs2/security/ASA-2007-136.htm
https://www.mandriva.com/security/advisories?name=MDKSA-2007:048
https://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
https://www.php.net/ChangeLog-5.php#5.2.1
https://www.php.net/releases/5_2_1.php
https://www.redhat.com/support/errata/RHSA-2007-0076.html
https://www.redhat.com/support/errata/RHSA-2007-0081.html
https://www.redhat.com/support/errata/RHSA-2007-0082.html
https://www.redhat.com/support/errata/RHSA-2007-0088.html
https://www.securityfocus.com/archive/1/461462/100/0/threaded
https://www.securityfocus.com/archive/1/466166/100/0/threaded
https://www.securityfocus.com/bid/22496
https://www.securitytracker.com/id?1017671
https://www.trustix.org/errata/2007/0009/
https://www.ubuntu.com/usn/usn-424-1
https://www.ubuntu.com/usn/usn-424-2
https://www.us.debian.org/security/2007/dsa-1264
https://www.vupen.com/english/advisories/2007/0546
https://issues.rpath.com/browse/RPL-1088
https://issues.rpath.com/browse/RPL-1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9514
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.