Vulnerability Name: CVE-2007-0988 (CCN-32709) Assigned: 2007-02-14 Published: 2007-02-14 Updated: 2019-10-09 Summary: The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-119 Vulnerability Consequences: Denial of Service References: Source: SGI Type: Broken Link20070201-01-P Source: MISC Type: Issue Tracking, Third Party Advisoryhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858 Source: MITRE Type: CNACVE-2007-0988 Source: HP Type: Broken LinkSSRT071423 Source: HP Type: Broken LinkHPSBTU02232 Source: CCN Type: HP Security Bulletin HPSBTU02232 SSRT071429Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) or HP Internet Express for Tru64 UNIX running PHP, Remote Arbitrary Code Execution, Unauthorized Disclosure of Information, or Denial of Service (DoS) Source: OSVDB Type: Broken Link32762 Source: CCN Type: RHSA-2007-0076Important: php security update Source: CCN Type: RHSA-2007-0081Important: php security update Source: CCN Type: RHSA-2007-0082Important: php security update Source: CCN Type: RHSA-2007-0088Important: php security update Source: CCN Type: RHSA-2007-0089Important: php security update for Stronghold Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0089 Source: SECUNIA Type: Third Party Advisory24195 Source: SECUNIA Type: Third Party Advisory24217 Source: SECUNIA Type: Third Party Advisory24236 Source: SECUNIA Type: Third Party Advisory24248 Source: SECUNIA Type: Third Party Advisory24284 Source: SECUNIA Type: Third Party Advisory24295 Source: SECUNIA Type: Third Party Advisory24322 Source: SECUNIA Type: Third Party Advisory24419 Source: SECUNIA Type: Third Party Advisory24421 Source: CCN Type: SA24432Avaya Products PHP Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory24432 Source: SECUNIA Type: Third Party Advisory24606 Source: CCN Type: SA24642Avaya Products php Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory24642 Source: SECUNIA Type: Third Party Advisory25056 Source: CCN Type: SA25423HP System Management Homepage PHP Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory25423 Source: CCN Type: SA25850HP Secure Web Server/Internet Express for Tru64 UNIX PHP Vulnerabilities Source: SECUNIA Type: Third Party Advisory25850 Source: GENTOO Type: Third Party AdvisoryGLSA-200703-21 Source: SREASON Type: Third Party Advisory2315 Source: CCN Type: SECTRACK ID: 1017671PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2007-101.htm Source: CCN Type: ASA-2007-101php security update (RHSA-2007-0076) Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2007-136.htm Source: CCN Type: ASA-2007-136php security update (RHSA-2007-081 RHSA-2007-0088) Source: DEBIAN Type: DSA-1264php4 -- several vulnerabilities Source: CCN Type: GLSA-200703-21PHP: Multiple vulnerabilities Source: MANDRIVA Type: Third Party AdvisoryMDKSA-2007:048 Source: SUSE Type: Broken LinkSUSE-SA:2007:032 Source: CCN Type: OpenPKG-SA-2007.010php Source: OPENPKG Type: Third Party AdvisoryOpenPKG-SA-2007.010 Source: CCN Type: OSVDB ID: 32762PHP on 64-bit zend_hash_init Function Remote DoS Source: CCN Type: MOPB-05-2007PHP unserialize() 64 bit Array Creation Denial of Service Vulnerability Source: MISC Type: Third Party Advisoryhttp://www.php-security.org/MOPB/MOPB-05-2007.html Source: CCN Type: The PHP Group Web sitePHP 5.2.1 Release Announcement Source: MISC Type: Patch, Third Party Advisoryhttp://www.php.net/releases/5_2_1.php Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0076 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0081 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0082 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0088 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20070227 rPSA-2007-0043-1 php php-mysql php-pgsql Source: SECTRACK Type: Third Party Advisory, VDB Entry1017671 Source: TRUSTIX Type: Broken Link2007-0009 Source: CCN Type: TLSA-2007-20Multiple vulnerabilities in php Source: CCN Type: USN-424-1PHP vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-424-1 Source: CCN Type: USN-424-2PHP regression Source: UBUNTU Type: Third Party AdvisoryUSN-424-2 Source: DEBIAN Type: Broken LinkDSA-1264 Source: VUPEN Type: Third Party AdvisoryADV-2007-1991 Source: VUPEN Type: Third Party AdvisoryADV-2007-2374 Source: XF Type: Third Party Advisory, VDB Entryphp-zendhashinit-dos(32709) Source: XF Type: UNKNOWNphp-zendhashinit-dos(32709) Source: CONFIRM Type: Broken Linkhttps://issues.rpath.com/browse/RPL-1088 Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:11092 Source: SUSE Type: SUSE-SA:2007:032PHP security problems Vulnerable Configuration: Configuration 1 :cpe:/a:php:php:4.0.0:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 4.0.0 and < 4.4.5) OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 5.0.0 and < 5.2.1) Configuration 2 :cpe:/o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:php:php:5.0.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:* OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:* AND cpe:/a:redhat:stronghold:-:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
php php 4.0
php php 4.0 beta1
php php 4.0 beta2
php php 4.0 beta3
php php 4.0 beta4
php php 4.0 beta_4_patch1
php php 4.0 rc1
php php 4.0 rc2
php php *
php php *
canonical ubuntu linux 5.10
canonical ubuntu linux 6.06
canonical ubuntu linux 6.10
php php 5.0.3
php php 5.0.4
php php 5.0.0
php php 5.0.5
php php 5.1.1
php php 5.1.2
php php 5.1.4
php php 5.0.2
php php 5.1.6
php php 5.2.0
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 5.1.0
php php 5.1.3
php php 5.1.5
redhat stronghold -
openpkg openpkg current
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
canonical ubuntu 6.06
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
novell open enterprise server *
novell opensuse 10.2