fkie_cve-2007-1583
Vulnerability from fkie_nvd
Published
2007-03-21 23:19
Modified
2025-04-09 00:30
Severity ?
Summary
The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
References
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=306172
cve@mitre.orghttp://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2007-0155.html
cve@mitre.orghttp://secunia.com/advisories/24909
cve@mitre.orghttp://secunia.com/advisories/24924
cve@mitre.orghttp://secunia.com/advisories/24945
cve@mitre.orghttp://secunia.com/advisories/24965
cve@mitre.orghttp://secunia.com/advisories/25056
cve@mitre.orghttp://secunia.com/advisories/25057
cve@mitre.orghttp://secunia.com/advisories/25062
cve@mitre.orghttp://secunia.com/advisories/25445
cve@mitre.orghttp://secunia.com/advisories/26235
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200705-19.xml
cve@mitre.orghttp://us2.php.net/releases/4_4_7.php
cve@mitre.orghttp://us2.php.net/releases/5_2_2.php
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1283
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:088
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:089
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:090
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_32_php.html
cve@mitre.orghttp://www.php-security.org/MOPB/MOPB-26-2007.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0153.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0162.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/466166/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23016
cve@mitre.orghttp://www.securityfocus.com/bid/25159
cve@mitre.orghttp://www.ubuntu.com/usn/usn-455-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2732
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1268
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=306172
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2007-0155.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24909
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24924
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24945
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24965
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25056
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25057
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25062
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25445
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26235
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-19.xml
af854a3a-2127-422b-91ae-364da2661108http://us2.php.net/releases/4_4_7.php
af854a3a-2127-422b-91ae-364da2661108http://us2.php.net/releases/5_2_2.php
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1283
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_32_php.html
af854a3a-2127-422b-91ae-364da2661108http://www.php-security.org/MOPB/MOPB-26-2007.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0153.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0162.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/466166/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23016
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25159
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-455-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2732
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1268
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245
Impacted products
Vendor Product Version
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0.0
php php 4.0.1
php php 4.0.1
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.3
php php 4.0.4
php php 4.0.4
php php 4.0.5
php php 4.0.6
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.1.0
php php 4.1.1
php php 4.1.2
php php 4.2
php php 4.2.0
php php 4.2.1
php php 4.2.2
php php 4.2.3
php php 4.3.0
php php 4.3.1
php php 4.3.2
php php 4.3.3
php php 4.3.4
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 4.3.9
php php 4.3.10
php php 4.3.11
php php 4.4.0
php php 4.4.1
php php 4.4.2
php php 4.4.3
php php 4.4.4
php php 4.4.5
php php 4.4.6
php php 5.0
php php 5.0
php php 5.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.1
php php 5.0.2
php php 5.0.3
php php 5.0.4
php php 5.0.5
php php 5.1.0
php php 5.1.1
php php 5.1.2
php php 5.1.3
php php 5.1.4
php php 5.1.5
php php 5.1.6
php php 5.2.0
php php 5.2.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDBEC461-D553-41B7-8D85-20B6A933C21C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
                     matchCriteriaId: "AEEF2298-98E8-409F-9205-84817CEF947B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "6AFC00BA-D64D-4407-AC69-FDD9FF013943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "D80F2A8B-B57F-4970-867A-55E8187C1502",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "EF4E0EFE-4FF6-4E8F-8EC5-68B059FC0C42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "49965B80-DC27-4864-BDF0-CBBFF16BFD80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "8212495A-0F2A-4787-93F2-F6618F9A777B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "C6F0F8FC-C57A-4AEA-A59F-41140347318A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BF57C14-86B6-419A-BAFF-93D01CB1E081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78BAA18C-E5A0-4210-B64B-709BBFF31EEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "419867C6-37BE-43B4-BFE0-6325FEE3807D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
                     matchCriteriaId: "37896E87-95C2-4039-8362-BC03B1C56706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A159B4-B847-47DE-B7F8-89384E6C551B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B59616-A309-40B4-94B1-50A7BC00E35C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "8667FBC6-04B6-40E5-93B3-6C22BEED4B26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39A1B1-416E-4436-8007-733B66904A14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "9B8B3138-3DCC-4682-B9A8-920E1110700D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2E5F96-66D2-4F99-A74D-6A2305EE218E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D724D09-0D45-4701-93C9-348301217C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "6E36203C-1392-49BB-AE7E-49626963D673",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6713614A-B14E-4A85-BF89-ED780068FC68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD95F8EB-B428-4B3C-9254-A5DECE03A989",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "069EB7EE-06B9-454F-9007-8DE5DCA33C53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
                     matchCriteriaId: "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "18BF5BE6-09EA-45AD-93BF-2BEF1742534E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC1460DF-1687-4314-BF1A-01290B20302D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "470380B0-3982-48FC-871B-C8B43C81900D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "63190D9B-7958-4B93-87C6-E7D5A572F6DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AAF4586-74FF-47C6-864B-656FDF3F33D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5245F990-B4A7-4ED8-909D-B8137CE79FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5652D5B0-68E4-4239-B9B7-599AFCF4C53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B71BB7-5239-4860-9100-8CABC3992D8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BD447A-4EED-482C-8F61-48FAD4FCF8BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F9DF9D-15E5-4387-ABE3-A7583331A928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "11579E5C-D7CF-46EE-B015-5F4185C174E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69CDE21-2FD4-4529-8F02-8709CF5E3D7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "221B9AC4-C63C-4386-B3BD-E4BC102C6124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B7BA75-2A32-4A8E-ADF8-BCB4FC48CB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BEA491B-77FD-4760-8F6F-3EBC6BD810D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB25CFBB-347C-479E-8853-F49DD6CBD7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D2937B3-D034-400E-84F5-33833CE3764D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "71AEE8B4-FCF8-483B-8D4C-2E80A02E925E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C2AF1D9-33B6-4B2C-9269-426B6B720164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "84B70263-37AA-4539-A286-12038A3792C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "E3797AB5-9E49-4251-A212-B6E5D9996764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7007E77F-60EF-44D8-9676-15B59DF1325F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "E727CECE-E452-489A-A42F-5A069D6AF80E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "149A1FB8-593E-412B-8E1C-3E560301D500",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "8FC144FA-8F84-44C0-B263-B639FEAD20FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "295907B4-C3DE-4021-BE3B-A8826D4379E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "B881352D-954E-4FC0-9E42-93D02A3F3089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "74E7AE59-1CB0-4300-BBE0-109F909789EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9222821E-370F-4616-B787-CC22C2F4E7CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9809449F-9A76-4318-B233-B4C2950A6EA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AA962D4-A4EC-4DC3-B8A9-D10941B92781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8CDFEF9-C367-4800-8A2F-375C261FAE55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "16E43B88-1563-4EFD-9267-AE3E8C35D67A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11E5715F-A8BC-49EF-836B-BB78E1BC0790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA68843-158E-463E-B68A-1ACF041C4E10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1874F637-77E2-4C4A-BF92-AEE96A60BFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9592B32E-55CD-42D0-901E-8319823BC820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9BF34B5-F74C-4D56-9841-42452D60CB87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD02D837-FD28-4E0F-93F8-25E8D1C84A99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "88358D1E-BE6F-4CE3-A522-83D1FA4739E3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.",
      },
      {
         lang: "es",
         value: "La función mb_parse_str del PHP 4.0.0 hasta la 4.4.6 y de la 5.0.0 hasta la 5.2.1 establece la bandera interna del registro global y no la deshabilita en ciertos casos cuando la secuencia de comandos termina, lo que permite a atacantes remotos invocar secuencias de comandos PHP disponibles con la funcionalidad del registro global, lo que no es detectado por estas secuencias de comandos, como lo demostrado forzando una violación del límite de memoria.",
      },
   ],
   id: "CVE-2007-1583",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-03-21T23:19:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://docs.info.apple.com/article.html?artnum=306172",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0155.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/24909",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/24924",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/24945",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/24965",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/25056",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/25057",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/25062",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/25445",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/26235",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200705-19.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://us2.php.net/releases/4_4_7.php",
      },
      {
         source: "cve@mitre.org",
         url: "http://us2.php.net/releases/5_2_2.php",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2007/dsa-1283",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2007_32_php.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.php-security.org/MOPB/MOPB-26-2007.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0153.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0162.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/466166/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/23016",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/25159",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-455-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2007/2732",
      },
      {
         source: "cve@mitre.org",
         url: "https://issues.rpath.com/browse/RPL-1268",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://docs.info.apple.com/article.html?artnum=306172",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0155.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24909",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24924",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24945",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24965",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25056",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25057",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25062",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25445",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26235",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200705-19.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://us2.php.net/releases/4_4_7.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://us2.php.net/releases/5_2_2.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2007/dsa-1283",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_32_php.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.php-security.org/MOPB/MOPB-26-2007.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0153.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0162.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/466166/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/25159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-455-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2732",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-1268",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.