5.8 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.018 Low
EPSS
Percentile
87.9%
The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
secunia.com/advisories/24514
secunia.com/advisories/24606
secunia.com/advisories/25025
secunia.com/advisories/25056
secunia.com/advisories/25057
secunia.com/advisories/25062
secunia.com/advisories/25423
secunia.com/advisories/25850
security.gentoo.org/glsa/glsa-200703-21.xml
www.debian.org/security/2007/dsa-1282
www.debian.org/security/2007/dsa-1283
www.novell.com/linux/security/advisories/2007_32_php.html
www.php-security.org/MOPB/MOPB-10-2007.html
www.securityfocus.com/bid/22805
www.ubuntu.com/usn/usn-455-1
www.vupen.com/english/advisories/2007/1991
www.vupen.com/english/advisories/2007/2374
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10792
www.exploit-db.com/exploits/3413