Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/24505 - | |
References | () http://secunia.com/advisories/25056 - | |
References | () http://www.novell.com/linux/security/advisories/2007_32_php.html - | |
References | () http://www.php-security.org/MOPB/MOPB-23-2007.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/22971 - | |
References | () http://www.vupen.com/english/advisories/2007/0960 - |
Information
Published : 2007-03-20 20:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1522
Mitre link : CVE-2007-1522
CVE.ORG link : CVE-2007-1522
JSON object : View
Products Affected
php
- php
CWE