Vulnerability Name: CVE-2007-1887 (CCN-33766) Assigned: 2007-03-31 Published: 2007-03-31 Updated: 2022-07-21 Summary: Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-120 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2007-1887 Source: CCN Type: HP Security Bulletin HPSBUX02262 SSRT071447HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) Source: HP Type: Broken LinkSSRT071447 Source: SECUNIA Type: Not Applicable24909 Source: SECUNIA Type: Not Applicable25057 Source: SECUNIA Type: Not Applicable25062 Source: SECUNIA Type: Not Applicable27037 Source: SECUNIA Type: Not Applicable27102 Source: SECUNIA Type: Not Applicable27110 Source: CCN Type: ASA-2007-416HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) (HPSBUX02262) Source: DEBIAN Type: Third Party AdvisoryDSA-1283 Source: DEBIAN Type: DSA-1283php5 -- several vulnerabilities Source: CCN Type: GLSA-200710-02PHP: Multiple vulnerabilities Source: GENTOO Type: Third Party AdvisoryGLSA-200710-02 Source: MANDRIVA Type: Broken LinkMDKSA-2007:088 Source: MANDRIVA Type: Broken LinkMDKSA-2007:089 Source: CCN Type: OpenPKG-SA-2007.019php Source: CCN Type: OSVDB ID: 33958PHP sqlite Library sqlite_udf_decode_binary() Function Overflow Source: CCN Type: MOPB-41-2007PHP 5 sqlite_udf_decode_binary() Buffer Overflow Vulnerability Source: MISC Type: Broken Link, Vendor Advisoryhttp://www.php-security.org/MOPB/MOPB-41-2007.html Source: CCN Type: The PHP Group Web sitePHP 5.2.1 Release Announcement Source: CONFIRM Type: Release Notes, Vendor Advisoryhttp://www.php.net/releases/5_2_1.php Source: CCN Type: PHP Web sitePHP 5.2.3 Release Announcement Source: CONFIRM Type: Release Notes, Vendor Advisoryhttp://www.php.net/releases/5_2_3.php Source: BID Type: Third Party Advisory, VDB Entry23235 Source: CCN Type: BID-23235PHP sqlite_udf_decode_binary() Function Buffer Overflow Vulnerability Source: CCN Type: USN-455-1PHP vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-455-1 Source: VUPEN Type: Permissions RequiredADV-2007-2016 Source: VUPEN Type: Permissions RequiredADV-2007-3386 Source: XF Type: Third Party Advisory, VDB Entryphp-sqlitedecodebinary-bo(33766) Source: XF Type: UNKNOWNphp-sqlitedecodebinary-bo(33766) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:5348 Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2007-2215 Vulnerable Configuration: Configuration 1 :cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 4.0 and < 4.4.5)OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 5.0.0 and < 5.2.3) Configuration 2 :cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:php:php:4.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.10:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.3:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.11:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.4.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:* OR cpe:/a:php:php:4.4.2:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:* OR cpe:/a:php:php:4.4.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:* OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:* OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.4.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:* OR cpe:/a:php:php:4.4.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.4.4:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:* AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
php php *
php php *
canonical ubuntu linux 7.04
canonical ubuntu linux 6.10
canonical ubuntu linux 6.06
debian debian linux 4.0
php php 4.0.5
php php 4.1.1
php php 4.2.0
php php 4.2.1
php php 4.2.3
php php 4.2.2
php php 4.3.0
php php 4.3.4
php php 4.3.9
php php 4.3.10
php php 5.0.3
php php 4.3.11
php php 5.0.4
php php 5.0.0
php php 4.4.0
php php 5.0.5
php php 5.1.1
php php 5.1.2
php php 5.1.4
php php 4.4.2
php php 4.3.3
php php 5.0.2
php php 4.4.3
php php 5.1.6
php php 5.2.0
php php 5.2.1
php php 4.4.5
php php 4.0.0
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.4
php php 4.0.6
php php 4.0.7
php php 4.0 beta_4_patch1
php php 4.0 beta1
php php 4.0 beta2
php php 4.0 beta3
php php 4.0 beta4
php php 4.1.0
php php 4.1.2
php php 4.3.1
php php 4.3.2
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 4.4.1
php php 4.4.4
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 5.1.0
php php 5.1.3
php php 5.1.5
php php 4.0 rc1
php php 4.0 rc2
openpkg openpkg current
gentoo linux *
hp hp-ux b.11.11
hp hp-ux b.11.23
mandrakesoft mandrake linux corporate server 3.0
debian debian linux 3.1
canonical ubuntu 6.06
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 2007.1
mandrakesoft mandrake linux 2008.0
debian debian linux 4.0
canonical ubuntu 7.04
hp hp-ux b.11.31