First published: Mon Mar 12 2007(Updated: )
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.2.3 | |
PHP | =4.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1413 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
PHP versions 5.2.3 and earlier, including PHP 4.4.6 and potentially other PHP 4 versions, are affected by CVE-2007-1413.
To mitigate CVE-2007-1413, upgrade to PHP version 5.2.4 or later, or to a stable version of PHP 7 or higher.
CVE-2007-1413 allows context-dependent attackers to execute arbitrary code, which can lead to a full system compromise.
Disabling the SNMP extension in PHP can serve as a temporary workaround for CVE-2007-1413 until the software is updated.