Vulnerability Name:

CVE-2007-1381 (CCN-33215)

Assigned:2007-03-04
Published:2007-03-04
Updated:2008-09-05
Summary:The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
This vulnerability impacts PHP CVS as of 2007-02-24
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-1381

Source: CONFIRM
Type: UNKNOWN
http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?r1=1.119.2.10.2.13&r2=1.119.2.10.2.14

Source: CONFIRM
Type: UNKNOWN
http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?revision=1.119.2.10.2.14&view=markup

Source: OSVDB
Type: UNKNOWN
32775

Source: CCN
Type: OSVDB ID: 32775
PHP WDDX Extension wddx_deserialize() Function Remote Overflow

Source: CCN
Type: MOPB-09-2007
PHP wddx_deserialize() String Append Buffer Overflow Vulnerability

Source: MISC
Type: Exploit
http://www.php-security.org/MOPB/MOPB-09-2007.html

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: CCN
Type: BID-22804
PHP WDDX_Deserialize Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
php-wddx-strlcpy-bo(33215)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    php php 5.0.0
    php php 5.0.0