php
Page content
- Author: voroskoi
- Vulnerable: 5.1.6-4siwenna1
- Unaffected: 5.1.6-5siwenna1
Several vulnerabilities and a weakness have been reported in PHP, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
- The “safe_mode” and “open_basedir” protection mechanisms can be bypassed via the session extension.
- Unspecified overflows can be exploited to cause a stack corruption in the session extension.
- Stack overflows exist in the “zip”, “imap”, and “sqlite” (PHP 5) extensions.
- A boundary error within the stream filters can be exploited to cause a buffer overflow.
- An integer overflow exists in the “str_replace()” function. This can be exploited to trigger an error when allocating memory and potentially allows the execution of arbitrary code, if the function is used on long, untrusted strings.
- An unspecified error when importing malicious WDDX data can be exploited to disclose random heap memory.
- A format string error exists in the *print() functions on 64-bit systems.
- Boundary errors exist within the “mail()” and the “ibase_add_user()”, “ibase_delete_user()”, and “ibase_modify_user()” functions and can be exploited to cause buffer overflows.
- A format string error exists in the “odbc_result_all()” function. Successful exploitation may allow the execution of arbitrary code, but requires that the attacker has control over the table contents of the used database.
- An error within the “imap_mail_compose()” function can be exploited to cause a heap based buffer overflow and may allow the execution of arbitrary code, if the function is used with untrusted input to create a new MIME message.
- A weakness within the “zend_hash_init()” function on 64bit systems can be exploited to cause a DoS via CPU consumption until the script times out by triggering an infinite loop when unserializing untrusted data.
- Bug Tracker URL: http://bugs.frugalware.org/task/1695
CVEs:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0905
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988