The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
References
Configurations
History
21 Nov 2024, 00:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167 - | |
References | () http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log - | |
References | () http://osvdb.org/36085 - | |
References | () http://secunia.com/advisories/26085 - Vendor Advisory | |
References | () http://secunia.com/advisories/26642 - Vendor Advisory | |
References | () http://secunia.com/advisories/27102 - Vendor Advisory | |
References | () http://secunia.com/advisories/30158 - Vendor Advisory | |
References | () http://secunia.com/advisories/30288 - Vendor Advisory | |
References | () http://www.debian.org/security/2008/dsa-1572 - | |
References | () http://www.debian.org/security/2008/dsa-1578 - | |
References | () http://www.exploit-db.com/exploits/4181 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml - | |
References | () http://www.php.net/ChangeLog-5.php#5.2.4 - | |
References | () http://www.php.net/releases/5_2_4.php - | |
References | () http://www.securityfocus.com/bid/24922 - | |
References | () http://www.securityfocus.com/bid/25498 - | |
References | () http://www.vupen.com/english/advisories/2007/2547 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35437 - |
Information
Published : 2007-07-17 00:30
Updated : 2024-11-21 00:34
NVD link : CVE-2007-3806
Mitre link : CVE-2007-3806
CVE.ORG link : CVE-2007-3806
JSON object : View
Products Affected
php
- php