// For flags

CVE-2007-0988

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.

La función zend_hash_init en PHP versión 5 anterior a 5.2.1 y PHP versión 4 anterior a 4.4.5, cuando se ejecuta en una plataforma de 64 bits, permite a los atacantes dependiendo del contexto causar una denegación de servicio (bucle infinito) al deserializar ciertas expresiones de enteros, que solo causa que argumentos de 32 bits sean usados después de la comprobación de un valor negativo, como es demostrado por un argumento "a:2147483649:{".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-02-16 CVE Reserved
  • 2007-02-20 CVE Published
  • 2024-02-01 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (47)
URL Tag Source
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858 Issue Tracking
http://osvdb.org/32762 Broken Link
http://secunia.com/advisories/24195 Third Party Advisory
http://secunia.com/advisories/24217 Third Party Advisory
http://secunia.com/advisories/24236 Third Party Advisory
http://secunia.com/advisories/24248 Third Party Advisory
http://secunia.com/advisories/24284 Third Party Advisory
http://secunia.com/advisories/24295 Third Party Advisory
http://secunia.com/advisories/24322 Third Party Advisory
http://secunia.com/advisories/24419 Third Party Advisory
http://secunia.com/advisories/24421 Third Party Advisory
http://secunia.com/advisories/24432 Third Party Advisory
http://secunia.com/advisories/24606 Third Party Advisory
http://secunia.com/advisories/24642 Third Party Advisory
http://secunia.com/advisories/25056 Third Party Advisory
http://secunia.com/advisories/25423 Third Party Advisory
http://secunia.com/advisories/25850 Third Party Advisory
http://securityreason.com/securityalert/2315 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm Third Party Advisory
http://www.php-security.org/MOPB/MOPB-05-2007.html Third Party Advisory
http://www.securityfocus.com/archive/1/461462/100/0/threaded Mailing List
http://www.securitytracker.com/id?1017671 Third Party Advisory
http://www.vupen.com/english/advisories/2007/1991 Third Party Advisory
http://www.vupen.com/english/advisories/2007/2374 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/32709 Third Party Advisory
https://issues.rpath.com/browse/RPL-1088 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11092 Signature
URL Date SRC
URL Date SRC
http://www.php.net/releases/5_2_1.php 2019-10-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 4.0.0 < 4.4.5
Search vendor "Php" for product "Php" and version " >= 4.0.0 < 4.4.5"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 5.0.0 < 5.2.1
Search vendor "Php" for product "Php" and version " >= 5.0.0 < 5.2.1"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
beta_4_patch1
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
beta1
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
beta2
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
beta3
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
beta4
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
rc1
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
4.0
Search vendor "Php" for product "Php" and version "4.0"
rc2
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
5.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "5.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.10"
-
Affected