SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Stronghold Vendors:   Red Hat
(Red Hat Issues Fix for Stronghold) PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
SecurityTracker Alert ID:  1017703
SecurityTracker URL:  http://securitytracker.com/id/1017703
CVE Reference:   CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988   (Links to External Site)
Date:  Feb 26 2007
Impact:   Denial of service via local system, Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in PHP. A remote or local user may be able to execute arbitrary code on the target system or cause denial of service conditions. Stronghold is affected.

Several buffer overflows exist in some PHP functions [CVE-2007-0906]. The PHP session extension, the str_replace() function, and the imap_mail_compose() functions are affected. A remote user may be able to submit specially crafted values to a program that uses the affected function to trigger an overflow and execute arbitrary code.

A buffer underflow in the sapi_header_op() function may let users cause denial of service conditions [CVE-2007-0907].

The wddx extension can be exploited using certain WDDX input packets to view random portions of heap memory [CVE-2007-0908].

A remote user under control of a database table accessed via the odbc_result_all() function can supply specially crafted data to trigger a format string flaw and execute arbitrary code [CVE-2007-0909].

Unspecified vulnerabilities may allow a user to overwrite certain super-global variables [CVE-2007-0910].

A user can supply specially crafted data to the zend_hash_init() function to cause the function to enter an infinite loop and consume excessive CPU resources until a timeout is reached [CVE-2007-0988].

Impact:   A remote or local user may be able to execute arbitrary code on the target system.

A remote or local user may be able to cause denial of service conditions.

The specific impact depends on the applications using PHP.

Solution:   Red Hat has issued a fix for Stronghold, which is affected by this PHP vulnerability.

The Red Hat advisory is available at:

http://rhn.redhat.com/errata/RHSA-2007-0089.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2007-0089.html (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 20 2007 PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC