CVE-2007-1484

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=306172 Third Party Advisory
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html Mailing List Third Party Advisory
http://secunia.com/advisories/24542 Third Party Advisory
http://secunia.com/advisories/25056 Third Party Advisory
http://secunia.com/advisories/25057 Third Party Advisory
http://secunia.com/advisories/25445 Third Party Advisory
http://secunia.com/advisories/26235 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xml Third Party Advisory
http://us2.php.net/releases/4_4_7.php Third Party Advisory
http://us2.php.net/releases/5_2_2.php Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_32_php.html Broken Link
http://www.php-security.org/MOPB/MOPB-24-2007.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/22990 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/25159 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-455-1 Third Party Advisory
http://www.vupen.com/english/advisories/2007/2732 Third Party Advisory
http://docs.info.apple.com/article.html?artnum=306172 Third Party Advisory
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html Mailing List Third Party Advisory
http://secunia.com/advisories/24542 Third Party Advisory
http://secunia.com/advisories/25056 Third Party Advisory
http://secunia.com/advisories/25057 Third Party Advisory
http://secunia.com/advisories/25445 Third Party Advisory
http://secunia.com/advisories/26235 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xml Third Party Advisory
http://us2.php.net/releases/4_4_7.php Third Party Advisory
http://us2.php.net/releases/5_2_2.php Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_32_php.html Broken Link
http://www.php-security.org/MOPB/MOPB-24-2007.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/22990 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/25159 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-455-1 Third Party Advisory
http://www.vupen.com/english/advisories/2007/2732 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=306172 - Third Party Advisory () http://docs.info.apple.com/article.html?artnum=306172 - Third Party Advisory
References () http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/24542 - Third Party Advisory () http://secunia.com/advisories/24542 - Third Party Advisory
References () http://secunia.com/advisories/25056 - Third Party Advisory () http://secunia.com/advisories/25056 - Third Party Advisory
References () http://secunia.com/advisories/25057 - Third Party Advisory () http://secunia.com/advisories/25057 - Third Party Advisory
References () http://secunia.com/advisories/25445 - Third Party Advisory () http://secunia.com/advisories/25445 - Third Party Advisory
References () http://secunia.com/advisories/26235 - Third Party Advisory () http://secunia.com/advisories/26235 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200705-19.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200705-19.xml - Third Party Advisory
References () http://us2.php.net/releases/4_4_7.php - Third Party Advisory () http://us2.php.net/releases/4_4_7.php - Third Party Advisory
References () http://us2.php.net/releases/5_2_2.php - Third Party Advisory () http://us2.php.net/releases/5_2_2.php - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2007_32_php.html - Broken Link () http://www.novell.com/linux/security/advisories/2007_32_php.html - Broken Link
References () http://www.php-security.org/MOPB/MOPB-24-2007.html - Exploit, Third Party Advisory () http://www.php-security.org/MOPB/MOPB-24-2007.html - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/22990 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/22990 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/25159 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/25159 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-455-1 - Third Party Advisory () http://www.ubuntu.com/usn/usn-455-1 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2007/2732 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/2732 - Third Party Advisory

Information

Published : 2007-03-16 21:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1484

Mitre link : CVE-2007-1484

CVE.ORG link : CVE-2007-1484


JSON object : View

Products Affected

php

  • php