First published: Tue Sep 04 2007(Updated: )
Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=4.0.0<4.4.8 | |
PHP | >=5.0.0<5.2.4 | |
Debian Linux | =3.1 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4657 has been classified as a medium severity vulnerability due to its potential to cause denial of service and information leakage.
To fix CVE-2007-4657, upgrade PHP to version 4.4.8 or later, or to version 5.2.4 or later.
CVE-2007-4657 affects PHP versions before 4.4.8 and 5.2.4, as well as specific versions of Debian and Ubuntu Linux.
CVE-2007-4657 can be exploited to obtain sensitive information through memory leaks or can lead to a denial of service by crashing the application.
CVE-2007-4657 is less of a concern for modern applications using supported PHP versions, but users of outdated versions should be aware of this vulnerability.