CVE-2007-4662

Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.
References
Link Resource
http://secunia.com/advisories/26642 Patch Vendor Advisory
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/27102
http://secunia.com/advisories/27377
http://secunia.com/advisories/27864
http://secunia.com/advisories/28249
http://www.debian.org/security/2008/dsa-1444
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/5_2_4.php Patch
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-549-2
http://www.vupen.com/english/advisories/2007/3023
https://exchange.xforce.ibmcloud.com/vulnerabilities/36390
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://launchpad.net/bugs/173043
https://usn.ubuntu.com/549-1/
http://secunia.com/advisories/26642 Patch Vendor Advisory
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/27102
http://secunia.com/advisories/27377
http://secunia.com/advisories/27864
http://secunia.com/advisories/28249
http://www.debian.org/security/2008/dsa-1444
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/5_2_4.php Patch
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-549-2
http://www.vupen.com/english/advisories/2007/3023
https://exchange.xforce.ibmcloud.com/vulnerabilities/36390
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://launchpad.net/bugs/173043
https://usn.ubuntu.com/549-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://secunia.com/advisories/26642 - Patch, Vendor Advisory () http://secunia.com/advisories/26642 - Patch, Vendor Advisory
References () http://secunia.com/advisories/26822 - () http://secunia.com/advisories/26822 -
References () http://secunia.com/advisories/26838 - () http://secunia.com/advisories/26838 -
References () http://secunia.com/advisories/27102 - () http://secunia.com/advisories/27102 -
References () http://secunia.com/advisories/27377 - () http://secunia.com/advisories/27377 -
References () http://secunia.com/advisories/27864 - () http://secunia.com/advisories/27864 -
References () http://secunia.com/advisories/28249 - () http://secunia.com/advisories/28249 -
References () http://www.debian.org/security/2008/dsa-1444 - () http://www.debian.org/security/2008/dsa-1444 -
References () http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml - () http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml -
References () http://www.php.net/ChangeLog-5.php#5.2.4 - () http://www.php.net/ChangeLog-5.php#5.2.4 -
References () http://www.php.net/releases/5_2_4.php - Patch () http://www.php.net/releases/5_2_4.php - Patch
References () http://www.trustix.org/errata/2007/0026/ - () http://www.trustix.org/errata/2007/0026/ -
References () http://www.ubuntu.com/usn/usn-549-2 - () http://www.ubuntu.com/usn/usn-549-2 -
References () http://www.vupen.com/english/advisories/2007/3023 - () http://www.vupen.com/english/advisories/2007/3023 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36390 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36390 -
References () https://issues.rpath.com/browse/RPL-1693 - () https://issues.rpath.com/browse/RPL-1693 -
References () https://issues.rpath.com/browse/RPL-1702 - () https://issues.rpath.com/browse/RPL-1702 -
References () https://launchpad.net/bugs/173043 - () https://launchpad.net/bugs/173043 -
References () https://usn.ubuntu.com/549-1/ - () https://usn.ubuntu.com/549-1/ -

Information

Published : 2007-09-04 22:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4662

Mitre link : CVE-2007-4662

CVE.ORG link : CVE-2007-4662


JSON object : View

Products Affected

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer