First published: Sat Mar 24 2007(Updated: )
PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1649 is rated as a medium severity vulnerability due to its potential to allow attackers to read sensitive information from memory.
To fix CVE-2007-1649, upgrade PHP to a version later than 5.2.1 that addresses the memory handling issue.
CVE-2007-1649 can be exploited by context-dependent attackers who pass specially crafted serialized data to PHP scripts.
CVE-2007-1649 specifically affects PHP version 5.2.1.
An exploit of CVE-2007-1649 could allow attackers to read unintended portions of the heap memory, potentially exposing sensitive data.