fkie_cve-2007-3806
Vulnerability from fkie_nvd
Published
2007-07-17 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
References
cve@mitre.orghttp://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
cve@mitre.orghttp://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
cve@mitre.orghttp://osvdb.org/36085
cve@mitre.orghttp://secunia.com/advisories/26085Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26642Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27102Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30158Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30288Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1572
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1578
cve@mitre.orghttp://www.exploit-db.com/exploits/4181
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
cve@mitre.orghttp://www.php.net/ChangeLog-5.php#5.2.4
cve@mitre.orghttp://www.php.net/releases/5_2_4.php
cve@mitre.orghttp://www.securityfocus.com/bid/24922
cve@mitre.orghttp://www.securityfocus.com/bid/25498
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2547Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35437
af854a3a-2127-422b-91ae-364da2661108http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
af854a3a-2127-422b-91ae-364da2661108http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/36085
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26085Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26642Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27102Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30158Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30288Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1572
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1578
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/4181
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/ChangeLog-5.php#5.2.4
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/releases/5_2_4.php
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24922
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25498
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2547Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
Impacted products
Vendor Product Version
php php 5.2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n glob en PHP versi\u00f3n 5.2.3, permite a  atacantes  dependiendo del contexto causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un valor no v\u00e1lido del par\u00e1metro flags, probablemente relacionado con la corrupci\u00f3n de memoria o una lectura no v\u00e1lida en plataformas win32, y posiblemente relacionado con la falta de inicializaci\u00f3n para una estructura glob."
    }
  ],
  "id": "CVE-2007-3806",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-07-17T00:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36085"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26085"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26642"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27102"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30158"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30288"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1572"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1578"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.exploit-db.com/exploits/4181"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.php.net/releases/5_2_4.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24922"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25498"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2547"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30158"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/4181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/releases/5_2_4.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25498"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  This issue only affected PHP on Windows platforms.",
      "lastModified": "2007-09-05T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…