← Voltar para CVEs
CVE-2007-4657
N/ADescricao
Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado9/4/2007
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxphp:php
Fraquezas (CWE)
CWE-119CWE-189
Referencias
http://secunia.com/advisories/26642(cve@mitre.org)
http://secunia.com/advisories/26822(cve@mitre.org)
http://secunia.com/advisories/26838(cve@mitre.org)
http://secunia.com/advisories/27102(cve@mitre.org)
http://secunia.com/advisories/27377(cve@mitre.org)
http://secunia.com/advisories/27864(cve@mitre.org)
http://secunia.com/advisories/28249(cve@mitre.org)
http://secunia.com/advisories/28318(cve@mitre.org)
http://secunia.com/advisories/28936(cve@mitre.org)
http://secunia.com/advisories/30288(cve@mitre.org)
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136(cve@mitre.org)
http://www.debian.org/security/2008/dsa-1444(cve@mitre.org)
http://www.debian.org/security/2008/dsa-1578(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml(cve@mitre.org)
http://www.php.net/ChangeLog-4.php(cve@mitre.org)
http://www.php.net/ChangeLog-5.php#5.2.4(cve@mitre.org)
http://www.php.net/releases/4_4_8.php(cve@mitre.org)
http://www.php.net/releases/5_2_4.php(cve@mitre.org)
http://www.trustix.org/errata/2007/0026/(cve@mitre.org)
http://www.ubuntu.com/usn/usn-549-2(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/3023(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/0059(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36388(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39399(cve@mitre.org)
https://issues.rpath.com/browse/RPL-1693(cve@mitre.org)
https://issues.rpath.com/browse/RPL-1702(cve@mitre.org)
https://launchpad.net/bugs/173043(cve@mitre.org)
https://usn.ubuntu.com/549-1/(cve@mitre.org)
http://secunia.com/advisories/26642(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26822(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26838(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27102(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27377(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27864(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28249(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28318(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28936(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30288(af854a3a-2127-422b-91ae-364da2661108)
http://secweb.se/en/advisories/php-strcspn-information-leak-vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1444(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1578(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/ChangeLog-4.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/ChangeLog-5.php#5.2.4(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/releases/4_4_8.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/releases/5_2_4.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2007/0026/(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-549-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3023(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0059(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36388(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39399(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1693(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1702(af854a3a-2127-422b-91ae-364da2661108)
https://launchpad.net/bugs/173043(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/549-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.