6.6 Medium
AI Score
Confidence
Low
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:C/A:N
0.023 Low
EPSS
Percentile
89.6%
CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a “\r\n\t\n” sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
rhn.redhat.com/errata/RHSA-2007-0155.html
secunia.com/advisories/24909
secunia.com/advisories/24924
secunia.com/advisories/24965
secunia.com/advisories/25025
secunia.com/advisories/25056
secunia.com/advisories/25057
secunia.com/advisories/25062
secunia.com/advisories/25445
security.gentoo.org/glsa/glsa-200705-19.xml
us2.php.net/releases/5_2_2.php
www.debian.org/security/2007/dsa-1282
www.debian.org/security/2007/dsa-1283
www.mandriva.com/security/advisories?name=MDKSA-2007:087
www.mandriva.com/security/advisories?name=MDKSA-2007:088
www.mandriva.com/security/advisories?name=MDKSA-2007:089
www.mandriva.com/security/advisories?name=MDKSA-2007:090
www.novell.com/linux/security/advisories/2007_32_php.html
www.php-security.org/MOPB/MOPB-34-2007.html
www.redhat.com/support/errata/RHSA-2007-0153.html
www.redhat.com/support/errata/RHSA-2007-0162.html
www.securityfocus.com/bid/23145
www.securitytracker.com/id?1017946
www.ubuntu.com/usn/usn-455-1
exchange.xforce.ibmcloud.com/vulnerabilities/33516
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951