PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
References
Configurations
History
21 Nov 2024, 00:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3365 - | |
References | () http://securityreason.com/securityalert/3366 - | |
References | () http://www.securityfocus.com/archive/1/483644/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/483648/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26426 - | |
References | () http://www.securityfocus.com/bid/26428 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38442 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38443 - |
Information
Published : 2007-11-20 19:46
Updated : 2024-11-21 00:39
NVD link : CVE-2007-6039
Mitre link : CVE-2007-6039
CVE.ORG link : CVE-2007-6039
JSON object : View
Products Affected
php
- php
CWE
CWE-20
Improper Input Validation