First published: Sat Mar 10 2007(Updated: )
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1383 has a critical severity rating due to the potential for arbitrary code execution.
To mitigate CVE-2007-1383, upgrade to a newer version of PHP that is not affected by this vulnerability.
CVE-2007-1383 specifically affects PHP version 4.0.
CVE-2007-1383 can be exploited by context-dependent attackers through integer overflow to execute arbitrary code.
The impact of CVE-2007-1383 allows attackers to gain unauthorized control over the affected system, potentially leading to data breaches.