SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
SecurityTracker Alert ID:  1017671
SecurityTracker URL:  http://securitytracker.com/id/1017671
CVE Reference:   CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988   (Links to External Site)
Date:  Feb 20 2007
Impact:   Denial of service via local system, Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.2.1
Description:   Several vulnerabilities were reported in PHP. A remote or local user may be able to execute arbitrary code on the target system or cause denial of service conditions.

Several buffer overflows exist in some PHP functions [CVE-2007-0906]. The PHP session extension, the str_replace() function, and the imap_mail_compose() functions are affected. A remote user may be able to submit specially crafted values to a program that uses the affected function to trigger an overflow and execute arbitrary code.

A buffer underflow in the sapi_header_op() function may let users cause denial of service conditions [CVE-2007-0907].

The wddx extension can be exploited using certain WDDX input packets to view random portions of heap memory [CVE-2007-0908].

A remote user under control of a database table accessed via the odbc_result_all() function can supply specially crafted data to trigger a format string flaw and execute arbitrary code [CVE-2007-0909].

Unspecified vulnerabilities may allow a user to overwrite certain super-global variables [CVE-2007-0910].

A user can supply specially crafted data to the zend_hash_init() function to cause the function to enter an infinite loop and consume excessive CPU resources until a timeout is reached [CVE-2007-0988].

Impact:   A remote or local user may be able to execute arbitrary code on the target system.

A remote or local user may be able to cause denial of service conditions.

The specific impact depends on the applications using PHP.

Solution:   The vendor has issued a fixed version (5.2.1).

The PHP advisory is available at:

http://www.php.net/releases/5_2_1.php

Vendor URL:  www.php.net/releases/5_2_1.php (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 20 2007 (Red Hat Issues Fix) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 3 and 4.
Feb 21 2007 (Red Hat Issues Fix) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 2.1.
Feb 22 2007 (Red Hat Issues Fix) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Application Stack.
Feb 26 2007 (Red Hat Issues Fix for Stronghold) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
Red Hat has issued a fix for Red Hat Stronghold for Enterprise Linux.
Mar 14 2007 (Red Hat Issues Fix) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 5.
May 23 2007 (HP Issues Fix for System Management Homepage) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
HP has issued a fix for HP System Management Homepage for Linux and Windows.
Jun 28 2007 (HP Issues Fix for Tru64 UNIX) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
HP has issued a fix for HP Tru64 UNIX.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC