First published: Mon Jun 23 2008(Updated: )
php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=4.4.9 | |
PHP | =5.2.5 | |
PHP | =5.2.6 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2829 has a medium severity level, as it can lead to denial of service and possible arbitrary code execution.
To fix CVE-2008-2829, you should upgrade your PHP version to a more recent and secure release that is not affected by this vulnerability.
CVE-2008-2829 affects PHP versions 5.2.5, 5.2.6, and all versions of PHP 4.x, as well as specific versions of Ubuntu Linux.
Yes, CVE-2008-2829 can be exploited remotely by context-dependent attackers through specially crafted IMAP requests.
CVE-2008-2829 is a buffer overflow vulnerability that can trigger a crash of the affected application.