First published: Tue Sep 04 2007(Updated: )
Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3996 is categorized as a high severity vulnerability due to potential remote code execution and denial of service.
To fix CVE-2007-3996, upgrade PHP to version 5.2.4 or later.
CVE-2007-3996 affects PHP versions up to and including 5.2.3.
CVE-2007-3996 allows attackers to exploit integer overflow vulnerabilities that can lead to application crashes or arbitrary code execution.
The gdImageCopyResized function is primarily affected by CVE-2007-3996, particularly with large srcW, srcH, sy, or sx values.