ID |
CVE-2007-1383
|
Summary |
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 10.0 (as of 05-09-2008 - 04:00) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-04-16 | organization | Red Hat | statement | The PHP interpreter does not offer a reliable "sandboxed" security
layer (as found in, say, a JVM) in which untrusted scripts can be run;
any script run by the PHP interpreter must be trusted with the
privileges of the interpreter itself. We therefore do not classify
this issue as security-sensitive since no trust boundary is crossed.
|
|
Last major update |
05-09-2008 - 04:00 |
Published |
10-03-2007 - 00:19 |
Last modified |
05-09-2008 - 04:00 |