CVE-2007-1522

Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://secunia.com/advisories/24505 - () http://secunia.com/advisories/24505 -
References () http://secunia.com/advisories/25056 - () http://secunia.com/advisories/25056 -
References () http://www.novell.com/linux/security/advisories/2007_32_php.html - () http://www.novell.com/linux/security/advisories/2007_32_php.html -
References () http://www.php-security.org/MOPB/MOPB-23-2007.html - Exploit, Vendor Advisory () http://www.php-security.org/MOPB/MOPB-23-2007.html - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/22971 - () http://www.securityfocus.com/bid/22971 -
References () http://www.vupen.com/english/advisories/2007/0960 - () http://www.vupen.com/english/advisories/2007/0960 -

Information

Published : 2007-03-20 20:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1522

Mitre link : CVE-2007-1522

CVE.ORG link : CVE-2007-1522


JSON object : View

Products Affected

php

  • php