The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0154.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0155.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0163.html - Broken Link | |
References | () http://secunia.com/advisories/24909 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/24910 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/24924 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/24941 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/24945 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/25445 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/26048 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/26642 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/27864 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/28936 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200705-19.xml - Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136 - Broken Link | |
References | () http://us2.php.net/releases/4_4_7.php - Release Notes | |
References | () http://us2.php.net/releases/5_2_2.php - Release Notes | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:087 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:088 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:089 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:090 - Third Party Advisory | |
References | () http://www.osvdb.org/32769 - Broken Link | |
References | () http://www.php-security.org/MOPB/MOPB-03-2007.html - Broken Link, Exploit, Vendor Advisory | |
References | () http://www.php.net/ChangeLog-4.php - Release Notes | |
References | () http://www.php.net/ChangeLog-5.php#5.2.4 - Release Notes | |
References | () http://www.php.net/releases/4_4_8.php - Release Notes | |
References | () http://www.php.net/releases/5_2_4.php - Release Notes | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0082.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0162.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/466166/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/22764 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1017771 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-549-2 - Third Party Advisory | |
References | () https://issues.rpath.com/browse/RPL-1268 - Broken Link | |
References | () https://launchpad.net/bugs/173043 - Exploit, Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017 - Broken Link | |
References | () https://usn.ubuntu.com/549-1/ - Broken Link |
02 Feb 2024, 14:03
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.php.net/releases/5_2_4.php - Release Notes | |
References | (SECUNIA) http://secunia.com/advisories/27864 - Broken Link, Vendor Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:089 - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:090 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/26048 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://www.php.net/ChangeLog-5.php#5.2.4 - Release Notes | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html - Mailing List | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2007-0155.html - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/28936 - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/22764 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/24909 - Broken Link, Vendor Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200705-19.xml - Third Party Advisory | |
References | (CONFIRM) http://us2.php.net/releases/4_4_7.php - Release Notes | |
References | (CONFIRM) https://launchpad.net/bugs/173043 - Exploit, Issue Tracking | |
References | (CONFIRM) http://us2.php.net/releases/5_2_2.php - Release Notes | |
References | (CONFIRM) http://www.php.net/releases/4_4_8.php - Release Notes | |
References | (SECTRACK) http://www.securitytracker.com/id?1017771 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/24941 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2007-0163.html - Broken Link | |
References | (CONFIRM) http://www.php.net/ChangeLog-4.php - Release Notes | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017 - Broken Link | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:087 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/24910 - Broken Link, Vendor Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/549-1/ - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/24945 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0162.html - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0082.html - Broken Link | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-549-2 - Third Party Advisory | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136 - Broken Link | |
References | (OSVDB) http://www.osvdb.org/32769 - Broken Link | |
References | (MISC) http://www.php-security.org/MOPB/MOPB-03-2007.html - Broken Link, Exploit, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/26642 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2007-0154.html - Third Party Advisory | |
References | (CONFIRM) https://issues.rpath.com/browse/RPL-1268 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/24924 - Broken Link, Vendor Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/466166/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/25445 - Broken Link, Vendor Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:088 - Third Party Advisory | |
CWE | CWE-674 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:zend:engine:*:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.7:rc4:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:* cpe:2.3:o:novell:suse_linux:10.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
First Time |
Suse linux Enterprise Server
Canonical Canonical ubuntu Linux Redhat enterprise Linux Server Novell suse Linux Suse Redhat Redhat enterprise Linux Workstation Novell Redhat enterprise Linux Desktop |
Information
Published : 2007-03-06 20:19
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1285
Mitre link : CVE-2007-1285
CVE.ORG link : CVE-2007-1285
JSON object : View
Products Affected
php
- php
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
canonical
- ubuntu_linux
suse
- linux_enterprise_server
novell
- suse_linux
CWE
CWE-674
Uncontrolled Recursion