CVE-2007-1889
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.
Error de signo de entero en la función _zend_mm_alloc_int en Zend Memory Manager de PHP 5.2.0 permite a atacantes remotos ejecutar código de su elección mediante una petición grande eamlloc, referida a una conversión incorrecta de entero largo con signo, como se demuestra mediante el cliente HTTP SOAP en PHP, y mediante una llamada a msg_receive con el valor entero positivo mas grande en maxsize.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-04-05 CVE Reserved
- 2007-04-06 CVE Published
- 2023-12-31 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/25056 | Third Party Advisory | |
http://secunia.com/advisories/25062 | Third Party Advisory | |
http://www.securityfocus.com/bid/23238 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33770 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.php-security.org/MOPB/MOPB-43-2007.html | 2017-07-29 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2007/dsa-1283 | 2017-07-29 | |
http://www.novell.com/linux/security/advisories/2007_32_php.html | 2017-07-29 | |
http://www.php-security.org/MOPB/MOPB-44-2007.html | 2017-07-29 |