ID CVE-2007-1886
Summary Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an "off by one overflow."
References
Vulnerable Configurations
  • PHP PHP 4.4.5
    cpe:2.3:a:php:php:4.4.5
  • PHP 5.2.1
    cpe:2.3:a:php:php:5.2.1
CVSS
Base: 6.8 (as of 10-04-2007 - 09:47)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family CGI abuses
    NASL id PHP_4_4_5.NASL
    description According to its banner, the version of PHP installed on the remote host is older than 4.4.5. Such versions may be affected by several issues, including buffer overflows, format string vulnerabilities, arbitrary code execution, 'safe_mode' and 'open_basedir' bypasses, and clobbering of super-globals.
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 24906
    published 2007-04-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24906
    title PHP < 4.4.5 Multiple Vulnerabilities
  • NASL family CGI abuses
    NASL id PHP_5_2_1.NASL
    description According to its banner, the version of PHP installed on the remote host is older than 5.2.1. Such versions may be affected by several issues, including buffer overflows, format string vulnerabilities, arbitrary code execution, 'safe_mode' and 'open_basedir' bypasses, and clobbering of super-globals.
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 24907
    published 2007-04-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24907
    title PHP < 5.2.1 Multiple Vulnerabilities
refmap via4
hp
  • HPSBMA02215
  • HPSBTU02232
  • SSRT071423
  • SSRT071429
misc http://www.php-security.org/MOPB/MOPB-39-2007.html
secunia
  • 25423
  • 25850
vupen
  • ADV-2007-1991
  • ADV-2007-2374
xf php-strreplace-single-unspecified(33768)
statements via4
contributor Joshua Bressers
lastmodified 2007-11-30
organization Red Hat
statement We do not consider this flaw to be a security issue as it is only exploitable by the script author. No trust boundary is crossed. For more information please see: https://bugzilla.redhat.com/show_bug.cgi?id=mopb#c37
Last major update 05-11-2012 - 22:36
Published 05-04-2007 - 21:19
Last modified 28-07-2017 - 21:31
Back to Top