Vulnerability Name: | CVE-2007-1381 (CCN-33215) | ||||||||
Assigned: | 2007-03-04 | ||||||||
Published: | 2007-03-04 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow. This vulnerability impacts PHP CVS as of 2007-02-24 | ||||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-1381 Source: CONFIRM Type: UNKNOWN http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?r1=1.119.2.10.2.13&r2=1.119.2.10.2.14 Source: CONFIRM Type: UNKNOWN http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?revision=1.119.2.10.2.14&view=markup Source: OSVDB Type: UNKNOWN 32775 Source: CCN Type: OSVDB ID: 32775 PHP WDDX Extension wddx_deserialize() Function Remote Overflow Source: CCN Type: MOPB-09-2007 PHP wddx_deserialize() String Append Buffer Overflow Vulnerability Source: MISC Type: Exploit http://www.php-security.org/MOPB/MOPB-09-2007.html Source: CCN Type: PHP Web site PHP: Hypertext Preprocessor Source: CCN Type: BID-22804 PHP WDDX_Deserialize Buffer Overflow Vulnerability Source: XF Type: UNKNOWN php-wddx-strlcpy-bo(33215) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |