Vulnerability Name:
CVE-2007-1411 (CCN-32885)
Assigned:
2007-03-05
Published:
2007-03-05
Updated:
2018-10-19
Summary:
Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.
CVSS v3 Severity:
5.9 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
6.8 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
)
5.8 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
4.6 Medium
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
)
4.0 Medium
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Privileges
References:
Source: CCN
Type: BugTraq Mailing List, Mon Mar 05 2007 - 18:57:48 CST
PHP <= 4.4.6 mssql_connect() & mssql_pconnect() local buffer overflow and safe_mode bypass
Source: MITRE
Type: CNA
CVE-2007-1411
Source: MISC
Type: Broken Link
http://retrogod.altervista.org/php_446_mssql_connect_bof.html
Source: CCN
Type: SA24353
PHP MSSQL Extension NTWDBLIB.DLL "dbopen" Buffer Overflow
Source: SECUNIA
Type: Third Party Advisory
24353
Source: SREASON
Type: Exploit, Third Party Advisory
2407
Source: CCN
Type: OSVDB ID: 33912
PHP MSSQL Extension NTWDBLIB.DLL Multiple Function Local Overflow
Source: CCN
Type: OSVDB ID: 41594
XAMPP adodb.php ADONewConnection Connect() Function Remote Overflow
Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor
Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20070306 PHP <= 4.4.6 mssql_connect() & mssql_pconnect() local buffer overflow and safe_mode bypass
Source: BID
Type: Exploit, Third Party Advisory, VDB Entry
22832
Source: CCN
Type: BID-22832
PHP MSSQL_Connect Local Buffer Overflow Vulnerability
Source: VUPEN
Type: Third Party Advisory
ADV-2007-0867
Source: XF
Type: Third Party Advisory, VDB Entry
php-ntwdblib-bo(32885)
Source: XF
Type: UNKNOWN
php-ntwdblib-bo(32885)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:php:php:*:*:*:*:*:*:*:*
(Version <= 4.4.6)
Configuration CCN 1
:
cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:rc2:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
php
php *
php
php 4.0.5
php
php 4.1.1
php
php 4.2.0
php
php 4.2.1
php
php 4.2.3
php
php 4.2.2
php
php 4.3.0
php
php 4.3.4
php
php 4.3.9
php
php 4.3.10
php
php 4.3.11
php
php 4.4.0
php
php 4.4.2
php
php 4.3.3
php
php 4.4.3
php
php 4.4.6
php
php 4.4.5
php
php 4.0 beta1
php
php 4.0.1
php
php 4.0.2
php
php 4.0.3
php
php 4.0.4
php
php 4.0.6
php
php 4.0.7
php
php 4.0 beta_4_patch1
php
php 4.0 beta1
php
php 4.0 beta2
php
php 4.0 beta3
php
php 4.0 beta4
php
php 4.1.0
php
php 4.1.2
php
php 4.3.1
php
php 4.3.2
php
php 4.3.5
php
php 4.3.6
php
php 4.3.7
php
php 4.3.8
php
php 4.4.1
php
php 4.4.4
php
php 4.0 rc1
php
php 4.0 rc2