Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-4659 | First vendor Publication | 2007-09-04 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The zend_alter_ini_entry function in PHP before 5.2.4 does not properly handle an interruption to the flow of execution triggered by a memory_limit violation, which has unknown impact and attack vectors. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20198 | |||
Oval ID: | oval:org.mitre.oval:def:20198 | ||
Title: | DSA-1444-1 php5 several issues | ||
Description: | It was discovered that the patch for <a href="http://security-tracker.debian.org/tracker/CVE-2007-4659">CVE-2007-4659</a> could lead to regressions in some scenarios. The fix has been reverted for now, a revised update will be provided in a future PHP DSA. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1444-1 CVE-2007-3799 CVE-2007-3998 CVE-2007-4657 CVE-2007-4658 CVE-2007-4660 CVE-2007-4662 CVE-2007-5898 CVE-2007-5899 CVE-2007-4659 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | php5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7538 | |||
Oval ID: | oval:org.mitre.oval:def:7538 | ||
Title: | DSA-1444 php5 -- several vulnerabilities | ||
Description: | It was discovered that the patch for CVE-2007-4659 could lead to regressions in some scenarios. The fix has been reverted for now, a revised update will be provided in a future PHP DSA. For reference the original advisory below: Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that the session_start() function allowed the insertion of attributes into the session cookie. Mattias Bengtsson and Philip Olausson discovered that a programming error in the implementation of the wordwrap() function allowed denial of service through an infinite loop. Stanislav Malyshev discovered that a format string vulnerability in the money_format() function could allow the execution of arbitrary code. Stefan Esser discovered that execution control flow inside the zend_alter_ini_entry() function is handled incorrectly in case of a memory limit violation. Gerhard Wagner discovered an integer overflow inside the chunk_split() function. Rasmus Lerdorf discovered that incorrect parsing of multibyte sequences may lead to disclosure of memory contents. It was discovered that the output_add_rewrite_var() function could leak session ID information, resulting in information disclosure. This update also fixes two bugs from the PHP 5.2.4 release which don't have security impact according to the Debian PHP security policy (CVE-2007-4657 and CVE-2007-4662), but which are fixed nonetheless. The old stable distribution (sarge) doesn't contain php5. For the stable distribution (etch), these problems have been fixed in version 5.2.0-8+etch10. For the unstable distribution (sid), these problems have been fixed in version 5.2.4-1, with the exception of CVE-2007-5898 and CVE-2007-5899, which will be fixed soon. Please note that Debian's version of PHP is hardened with the Suhosin patch beginning with version 5.2.4-1, which renders several vulnerabilities ineffective. We recommend that you upgrade your php5 packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1444 CVE-2007-3799 CVE-2007-3998 CVE-2007-4657 CVE-2007-4658 CVE-2007-4660 CVE-2007-4662 CVE-2007-5898 CVE-2007-5899 CVE-2007-4659 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | php5 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-06-21 | Name : PHP version smaller than 5.2.4 File : nvt/nopsec_php_5_2_4.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-02 (php) File : nvt/glsa_200710_02.nasl |
2008-09-04 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php51.nasl |
2008-01-31 | Name : Debian Security Advisory DSA 1444-2 (php5) File : nvt/deb_1444_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1444-1 (php5) File : nvt/deb_1444_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
36864 | PHP zend_alter_ini_entry Function Unspecified Issue |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-01-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1444.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-02.nasl - Type : ACT_GATHER_INFO |
2007-09-14 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_71d903fc602d11dc898c001921ab2fa4.nasl - Type : ACT_GATHER_INFO |
2007-09-03 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_2_4.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:16:23 |
|
2024-11-28 12:13:23 |
|
2024-08-02 12:07:38 |
|
2024-08-02 01:02:24 |
|
2024-02-02 01:07:15 |
|
2024-02-01 12:02:24 |
|
2023-09-05 12:06:46 |
|
2023-09-05 01:02:15 |
|
2023-09-02 12:06:52 |
|
2023-09-02 01:02:16 |
|
2023-08-12 12:07:59 |
|
2023-08-12 01:02:16 |
|
2023-08-11 12:06:55 |
|
2023-08-11 01:02:20 |
|
2023-08-06 12:06:36 |
|
2023-08-06 01:02:17 |
|
2023-08-04 12:06:42 |
|
2023-08-04 01:02:20 |
|
2023-07-14 12:06:41 |
|
2023-07-14 01:02:17 |
|
2023-03-29 01:07:29 |
|
2023-03-28 12:02:23 |
|
2022-10-11 12:05:56 |
|
2022-10-11 01:02:08 |
|
2021-05-04 12:06:20 |
|
2021-04-22 01:06:53 |
|
2020-05-23 01:38:42 |
|
2020-05-23 00:20:23 |
|
2019-06-08 12:02:12 |
|
2018-10-04 12:04:47 |
|
2017-07-29 12:02:30 |
|
2016-10-05 01:00:39 |
|
2016-06-28 16:52:45 |
|
2016-04-26 16:33:21 |
|
2014-02-17 10:41:33 |
|
2013-05-11 10:35:22 |
|