ID CVE-2007-1383
Summary Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
References
Vulnerable Configurations
  • cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 05-09-2008 - 04:00)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 22765
gentoo GLSA-200703-21
misc http://www.php-security.org/MOPB/MOPB-01-2007.html
osvdb 32770
secunia
  • 24606
  • 25056
suse SUSE-SA:2007:032
statements via4
contributor Mark J Cox
lastmodified 2007-04-16
organization Red Hat
statement The PHP interpreter does not offer a reliable "sandboxed" security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
Last major update 05-09-2008 - 04:00
Published 10-03-2007 - 00:19
Last modified 05-09-2008 - 04:00
Back to Top