CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?r1=1.119.2.10.2.13&r2=1.119.2.10.2.14 - () http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?r1=1.119.2.10.2.13&r2=1.119.2.10.2.14 -
References () http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?revision=1.119.2.10.2.14&view=markup - () http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?revision=1.119.2.10.2.14&view=markup -
References () http://www.osvdb.org/32775 - () http://www.osvdb.org/32775 -
References () http://www.php-security.org/MOPB/MOPB-09-2007.html - Exploit () http://www.php-security.org/MOPB/MOPB-09-2007.html - Exploit

Information

Published : 2007-03-10 00:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1381

Mitre link : CVE-2007-1381

CVE.ORG link : CVE-2007-1381


JSON object : View

Products Affected

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer