CVE-2007-1286

Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
http://rhn.redhat.com/errata/RHSA-2007-0154.html
http://rhn.redhat.com/errata/RHSA-2007-0155.html
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24419
http://secunia.com/advisories/24606
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25025
http://secunia.com/advisories/25062
http://secunia.com/advisories/25423
http://secunia.com/advisories/25445
http://secunia.com/advisories/25850
http://security.gentoo.org/glsa/glsa-200703-21.xml
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://www.debian.org/security/2007/dsa-1282
http://www.debian.org/security/2007/dsa-1283
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.osvdb.org/32771
http://www.php-security.org/MOPB/MOPB-04-2007.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/archive/1/466166/100/0/threaded
http://www.securityfocus.com/bid/22765
http://www.trustix.org/errata/2007/0009/
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/32796
https://issues.rpath.com/browse/RPL-1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
http://rhn.redhat.com/errata/RHSA-2007-0154.html
http://rhn.redhat.com/errata/RHSA-2007-0155.html
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24419
http://secunia.com/advisories/24606
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25025
http://secunia.com/advisories/25062
http://secunia.com/advisories/25423
http://secunia.com/advisories/25445
http://secunia.com/advisories/25850
http://security.gentoo.org/glsa/glsa-200703-21.xml
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://www.debian.org/security/2007/dsa-1282
http://www.debian.org/security/2007/dsa-1283
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.osvdb.org/32771
http://www.php-security.org/MOPB/MOPB-04-2007.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/archive/1/466166/100/0/threaded
http://www.securityfocus.com/bid/22765
http://www.trustix.org/errata/2007/0009/
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
https://exchange.xforce.ibmcloud.com/vulnerabilities/32796
https://issues.rpath.com/browse/RPL-1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:27

Type Values Removed Values Added
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 -
References () http://rhn.redhat.com/errata/RHSA-2007-0154.html - () http://rhn.redhat.com/errata/RHSA-2007-0154.html -
References () http://rhn.redhat.com/errata/RHSA-2007-0155.html - () http://rhn.redhat.com/errata/RHSA-2007-0155.html -
References () http://rhn.redhat.com/errata/RHSA-2007-0163.html - () http://rhn.redhat.com/errata/RHSA-2007-0163.html -
References () http://secunia.com/advisories/24419 - () http://secunia.com/advisories/24419 -
References () http://secunia.com/advisories/24606 - () http://secunia.com/advisories/24606 -
References () http://secunia.com/advisories/24910 - () http://secunia.com/advisories/24910 -
References () http://secunia.com/advisories/24924 - () http://secunia.com/advisories/24924 -
References () http://secunia.com/advisories/24941 - () http://secunia.com/advisories/24941 -
References () http://secunia.com/advisories/24945 - () http://secunia.com/advisories/24945 -
References () http://secunia.com/advisories/25025 - () http://secunia.com/advisories/25025 -
References () http://secunia.com/advisories/25062 - () http://secunia.com/advisories/25062 -
References () http://secunia.com/advisories/25423 - () http://secunia.com/advisories/25423 -
References () http://secunia.com/advisories/25445 - () http://secunia.com/advisories/25445 -
References () http://secunia.com/advisories/25850 - () http://secunia.com/advisories/25850 -
References () http://security.gentoo.org/glsa/glsa-200703-21.xml - () http://security.gentoo.org/glsa/glsa-200703-21.xml -
References () http://security.gentoo.org/glsa/glsa-200705-19.xml - () http://security.gentoo.org/glsa/glsa-200705-19.xml -
References () http://www.debian.org/security/2007/dsa-1282 - () http://www.debian.org/security/2007/dsa-1282 -
References () http://www.debian.org/security/2007/dsa-1283 - () http://www.debian.org/security/2007/dsa-1283 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:087 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:087 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:088 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:088 -
References () http://www.osvdb.org/32771 - () http://www.osvdb.org/32771 -
References () http://www.php-security.org/MOPB/MOPB-04-2007.html - Exploit, Patch, Vendor Advisory () http://www.php-security.org/MOPB/MOPB-04-2007.html - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/466166/100/0/threaded - () http://www.securityfocus.com/archive/1/466166/100/0/threaded -
References () http://www.securityfocus.com/bid/22765 - () http://www.securityfocus.com/bid/22765 -
References () http://www.trustix.org/errata/2007/0009/ - () http://www.trustix.org/errata/2007/0009/ -
References () http://www.vupen.com/english/advisories/2007/1991 - () http://www.vupen.com/english/advisories/2007/1991 -
References () http://www.vupen.com/english/advisories/2007/2374 - () http://www.vupen.com/english/advisories/2007/2374 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32796 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32796 -
References () https://issues.rpath.com/browse/RPL-1268 - () https://issues.rpath.com/browse/RPL-1268 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575 -

Information

Published : 2007-03-06 20:19

Updated : 2024-11-21 00:27


NVD link : CVE-2007-1286

Mitre link : CVE-2007-1286

CVE.ORG link : CVE-2007-1286


JSON object : View

Products Affected

php

  • php