7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:C/A:N
0.609 Medium
EPSS
Percentile
97.7%
CentOS Errata and Security Advisory CESA-2007:0155
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
A denial of service flaw was found in the way PHP processed a deeply nested
array. A remote attacker could cause the PHP interpreter to crash by
submitting an input variable with a deeply nested array. (CVE-2007-1285)
A flaw was found in the way PHP’s unserialize() function processed data. If
a remote attacker was able to pass arbitrary data to PHP’s unserialize()
function, they could possibly execute arbitrary code as the apache user.
(CVE-2007-1286)
A flaw was found in the way the mbstring extension set global variables. A
script which used the mb_parse_str() function to set global variables could
be forced to enable the register_globals configuration option, possibly
resulting in global variable injection. (CVE-2007-1583)
A double free flaw was found in PHP’s session_decode() function. If a
remote attacker was able to pass arbitrary data to PHP’s session_decode()
function, they could possibly execute arbitrary code as the apache user.
(CVE-2007-1711)
A flaw was discovered in the way PHP’s mail() function processed header
data. If a script sent mail using a Subject header containing a string from
an untrusted source, a remote attacker could send bulk e-mail to unintended
recipients. (CVE-2007-1718)
A heap based buffer overflow flaw was discovered in PHP’s gd extension. A
script that could be forced to process WBMP images from an untrusted source
could result in arbitrary code execution. (CVE-2007-1001)
A buffer over-read flaw was discovered in PHP’s gd extension. A script that
could be forced to write arbitrary string using a JIS font from an
untrusted source could cause the PHP interpreter to crash. (CVE-2007-0455)
Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-April/075831.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075834.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075839.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075840.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075841.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075842.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075844.html
https://lists.centos.org/pipermail/centos-announce/2007-April/075845.html
Affected packages:
php
php-devel
php-domxml
php-gd
php-imap
php-ldap
php-mbstring
php-mysql
php-ncurses
php-odbc
php-pear
php-pgsql
php-snmp
php-xmlrpc
Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0155
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | ia64 | php | < 4.3.2-40.ent | php-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-devel | < 4.3.2-40.ent | php-devel-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-imap | < 4.3.2-40.ent | php-imap-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-ldap | < 4.3.2-40.ent | php-ldap-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-mysql | < 4.3.2-40.ent | php-mysql-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-odbc | < 4.3.2-40.ent | php-odbc-4.3.2-40.ent.ia64.rpm |
CentOS | 3 | ia64 | php-pgsql | < 4.3.2-40.ent | php-pgsql-4.3.2-40.ent.ia64.rpm |
CentOS | 4 | ia64 | php | < 4.3.9-3.22.4 | php-4.3.9-3.22.4.ia64.rpm |
CentOS | 4 | ia64 | php-devel | < 4.3.9-3.22.4 | php-devel-4.3.9-3.22.4.ia64.rpm |
CentOS | 4 | ia64 | php-domxml | < 4.3.9-3.22.4 | php-domxml-4.3.9-3.22.4.ia64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:C/A:N
0.609 Medium
EPSS
Percentile
97.7%