CVE-2007-1413

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://retrogod.altervista.org/php_446_snmpget_local_bof.html - () http://retrogod.altervista.org/php_446_snmpget_local_bof.html -
References () http://secunia.com/advisories/24440 - () http://secunia.com/advisories/24440 -
References () http://www.securityfocus.com/bid/22893 - Exploit () http://www.securityfocus.com/bid/22893 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35517 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35517 -
References () https://www.exploit-db.com/exploits/3439 - () https://www.exploit-db.com/exploits/3439 -
References () https://www.exploit-db.com/exploits/4204 - () https://www.exploit-db.com/exploits/4204 -

Information

Published : 2007-03-12 23:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1413

Mitre link : CVE-2007-1413

CVE.ORG link : CVE-2007-1413


JSON object : View

Products Affected

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer