Vulnerability Name:

CVE-2007-3806 (CCN-35437)

Assigned:2007-07-14
Published:2007-07-14
Updated:2017-09-29
Summary:The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
CVSS v3 Severity:7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
6.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-399
CWE-20
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2007-3806

Source: MISC
Type: UNKNOWN
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167

Source: CCN
Type: PHP CVS Repository
initialize glob struct

Source: MISC
Type: UNKNOWN
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log

Source: OSVDB
Type: UNKNOWN
36085

Source: CCN
Type: SA26085
PHP "glob()" Code Execution Vulnerability

Source: SECUNIA
Type: Vendor Advisory
26085

Source: CCN
Type: SA26642
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
26642

Source: SECUNIA
Type: Vendor Advisory
27102

Source: SECUNIA
Type: Vendor Advisory
30158

Source: SECUNIA
Type: Vendor Advisory
30288

Source: DEBIAN
Type: UNKNOWN
DSA-1572

Source: DEBIAN
Type: UNKNOWN
DSA-1578

Source: DEBIAN
Type: DSA-1572
php5 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1578
php4 -- several vulnerabilities

Source: EXPLOIT-DB
Type: UNKNOWN
4181

Source: CCN
Type: GLSA-200710-02
PHP: Multiple vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200710-02

Source: CCN
Type: OSVDB ID: 36085
PHP glob() Function flags Parameter Memory Corruption

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php#5.2.4

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/releases/5_2_4.php

Source: BID
Type: UNKNOWN
24922

Source: CCN
Type: BID-24922
PHP Glob() Function Arbitrary Code Execution Vulnerability

Source: BID
Type: UNKNOWN
25498

Source: CCN
Type: BID-25498
PHP 5.2.3 and Prior Versions Multiple Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2007-2547

Source: XF
Type: UNKNOWN
php-glob-dos(35437)

Source: XF
Type: UNKNOWN
php-glob-security-bypass(35437)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:8065
    P
    DSA-1578 php4 -- several vulnerabilities
    2015-02-23
    oval:org.mitre.oval:def:18224
    P
    DSA-1578-1 php4 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18599
    P
    DSA-1572-1 php5 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7889
    P
    DSA-1572 php5 -- several vulnerabilities
    2014-06-23
    oval:org.debian:def:1578
    V
    several vulnerabilities
    2008-05-17
    oval:org.debian:def:1572
    V
    several vulnerabilities
    2008-05-11
    BACK
    php php 5.2.3
    php php 5.0.3
    php php 5.0.4
    php php 5.0.0
    php php 5.0.5
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.0.2
    php php 5.1.6
    php php 5.2.0
    php php 5.2.1
    php php 5.2.3
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.1.0
    php php 5.1.3
    php php 5.1.5
    php php 5.2.2
    gentoo linux *
    debian debian linux 4.0