Computer Security
[EN] securityvulns.ru no-pyccku


PHP multiple security vulnerabilities
Published:01.06.2007
Source:
SecurityVulns ID:7764
Type:library
Threat Level:
6/10
Description:chunk_split() integer overflow.
Affected:PHP : PHP 4.4
 PHP : PHP 5.2
CVE:CVE-2007-2872 (Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.)
 CVE-2007-2756 (The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.)
 CVE-2007-1900 (CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string.)
 CVE-2007-1887 (Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character.)
Original documentdocumentOPENPKG, [OpenPKG-SA-2007.020] OpenPKG Security Advisory (php) (01.06.2007)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20070601-0 :: PHP chunk_split() integer overflow (01.06.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod