Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.
References
Configurations
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/php_446_ibase_connect_bof.html - Broken Link | |
References | () http://secunia.com/advisories/24529 - Third Party Advisory | |
References | () http://securityreason.com/securityalert/2439 - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/462931/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/22976 - Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33019 - Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/3488 - Third Party Advisory, VDB Entry |
Information
Published : 2007-03-16 21:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1475
Mitre link : CVE-2007-1475
CVE.ORG link : CVE-2007-1475
JSON object : View
Products Affected
php
- php
CWE