CVE-2007-2872 : Detail

CVE-2007-2872

25.87%V3
Network
2007-06-04
15h00 +00:00
2018-10-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 30117

Publication date : 2007-05-30 22h00 +00:00
Author : Gerhard Wagner
EDB Verified : Yes

source: https://www.securityfocus.com/bid/24261/info PHP is prone to an integer-overflow vulnerability because it fails to ensure that integer values aren't overrun. Attackers may exploit this issue to cause a buffer overflow and to corrupt process memory. Attackers may be able to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely result in a denial-of-service condition. This issue affects versions prior to PHP 5.2.3. <? $a=str_repeat("A", 65535); $b=1; $c=str_repeat("A", 65535); chunk_split($a,$b,$c); ?>

Products Mentioned

Configuraton 0

Php>>Php >> Version To (including) 4.4.7

Php>>Php >> Version 5.0.0

Php>>Php >> Version 5.0.1

Php>>Php >> Version 5.0.2

Php>>Php >> Version 5.0.3

Php>>Php >> Version 5.0.4

Php>>Php >> Version 5.0.5

Php>>Php >> Version 5.1.0

Php>>Php >> Version 5.1.1

Php>>Php >> Version 5.1.2

Php>>Php >> Version 5.1.3

Php>>Php >> Version 5.1.4

Php>>Php >> Version 5.1.5

Php>>Php >> Version 5.1.6

Php>>Php >> Version 5.2.0

Php>>Php >> Version 5.2.1

Php>>Php >> Version 5.2.2

References

http://secunia.com/advisories/26231
Tags : third-party-advisory, x_refsource_SECUNIA
https://launchpad.net/bugs/173043
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/27110
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0888.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26048
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28750
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0059
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/28658
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26967
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27351
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/27864
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.php.net/releases/4_4_8.php
Tags : x_refsource_CONFIRM
http://www.securitytracker.com/id?1018186
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/30040
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0398
Tags : vdb-entry, x_refsource_VUPEN
http://osvdb.org/36083
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/28936
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26930
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25456
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2007-0889.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.trustix.org/errata/2007/0023/
Tags : vendor-advisory, x_refsource_TRUSTIX
https://usn.ubuntu.com/549-1/
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2007/3386
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27037
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2061
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27545
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26838
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.php.net/releases/5_2_3.php
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/27377
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25535
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.php.net/ChangeLog-4.php
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/27102
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26895
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28318
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-549-2
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2007-0890.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2007-0891.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26871
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24261
Tags : vdb-entry, x_refsource_BID