First published: Tue Mar 27 2007(Updated: )
Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1709 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2007-1709, upgrade to a PHP version later than 5.2.1 that does not contain this buffer overflow vulnerability.
CVE-2007-1709 affects users running PHP version 5.2.1 with the phpDOC extension enabled.
CVE-2007-1709 facilitates a buffer overflow attack that can allow context-dependent attackers to execute arbitrary code.
CVE-2007-1709 is considered a local vulnerability, as it requires an attacker to have access to the system to exploit the buffer overflow.