First published: Tue Feb 13 2007(Updated: )
Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.3.9 | |
PHP | =3.0 | |
PHP | =3.0.5 | |
PHP | =3.0.11 | |
PHP | =5.1.5 | |
PHP | =5.1.2 | |
PHP | =4.2.0 | |
PHP | =5.1.1 | |
PHP | =3.0.1 | |
PHP | =3.0.2 | |
PHP | =4.4.4 | |
PHP | =4.1.0 | |
PHP | =5.1.6 | |
PHP | =4.3.4 | |
PHP | =4.0.4 | |
PHP | =4.3.0 | |
PHP | =4.0.5 | |
PHP | =5.0-rc1 | |
PHP | =3.0.8 | |
PHP | =5.0.5 | |
PHP | =4.3.6 | |
PHP | =3.0.13 | |
PHP | =5.0.1 | |
PHP | =5.1.4 | |
PHP | =4.0.7-rc2 | |
PHP | =4.3.7 | |
PHP | =5.0.4 | |
PHP | =4.0.7-rc1 | |
PHP | =4.2.2 | |
PHP | =4.4.2 | |
PHP | =3.0.7 | |
PHP | =4.3.2 | |
PHP | =4.3.11 | |
PHP | =3.0.6 | |
PHP | =4.0.3-patch1 | |
PHP | =3.0.17 | |
PHP | =4.0.7 | |
PHP | =4.0.2 | |
PHP | =4.3.3 | |
PHP | =5.0-rc3 | |
PHP | =4.1.1 | |
PHP | =3.0.15 | |
PHP | =3.0.16 | |
PHP | =4.4.3 | |
PHP | =5.0.3 | |
PHP | =3.0.10 | |
PHP | =3.0.4 | |
PHP | =4.2.3 | |
PHP | =5.1.0 | |
PHP | =4.0.1-patch1 | |
PHP | =4.0 | |
PHP | =4.0.1-patch2 | |
PHP | =4.0.6 | |
PHP | =5.2.0 | |
PHP | =5.0-rc2 | |
PHP | =4.1.2 | |
PHP | =4.0.7-rc3 | |
PHP | =4.3.1 | |
PHP | =5.1.3 | |
PHP | =3.0.18 | |
PHP | =4.4.0 | |
PHP | =4.3.10 | |
PHP | =4.2.1 | |
PHP | =4.0.1 | |
PHP | =5.0.2 | |
PHP | =3.0.12 | |
PHP | =4.2 | |
PHP | =4.4.1 | |
PHP | =4.0.3 | |
PHP | =3.0.14 | |
PHP | =3.0.9 | |
PHP | =3.0.3 | |
PHP | =5.0.0 | |
PHP | =4.3.8 | |
PHP | =4.3.5 | |
Trustix Secure Linux | =3.0 | |
Trustix Secure Linux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0906 is classified with a moderate severity as it can lead to denial of service and potentially allow the execution of arbitrary code.
To fix CVE-2007-0906, upgrade PHP to version 5.2.1 or later, which addresses the buffer overflow vulnerabilities.
CVE-2007-0906 affects multiple PHP versions including 3.0, 4.0, and 5.1 series prior to 5.2.1.
The potential impacts of CVE-2007-0906 include denial of service and unauthorized execution of code on affected systems.
Using PHP versions prior to 5.2.1 is not safe because they are vulnerable to the buffer overflow exploits outlined in CVE-2007-0906.