CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
95.6%
The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | * | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 7.10 | cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* |
novell | suse_linux | 10.0 | cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:* |
novell | suse_linux | 10.1 | cpe:2.3:o:novell:suse_linux:10.1:*:*:*:*:*:*:* |
suse | linux_enterprise_server | 8 | cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* |
suse | linux_enterprise_server | 10 | cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 3.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 4.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 2.0 | cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 3.0 | cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
rhn.redhat.com/errata/RHSA-2007-0154.html
rhn.redhat.com/errata/RHSA-2007-0155.html
rhn.redhat.com/errata/RHSA-2007-0163.html
secunia.com/advisories/24909
secunia.com/advisories/24910
secunia.com/advisories/24924
secunia.com/advisories/24941
secunia.com/advisories/24945
secunia.com/advisories/25445
secunia.com/advisories/26048
secunia.com/advisories/26642
secunia.com/advisories/27864
secunia.com/advisories/28936
security.gentoo.org/glsa/glsa-200705-19.xml
slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
us2.php.net/releases/4_4_7.php
us2.php.net/releases/5_2_2.php
www.mandriva.com/security/advisories?name=MDKSA-2007:087
www.mandriva.com/security/advisories?name=MDKSA-2007:088
www.mandriva.com/security/advisories?name=MDKSA-2007:089
www.mandriva.com/security/advisories?name=MDKSA-2007:090
www.osvdb.org/32769
www.php-security.org/MOPB/MOPB-03-2007.html
www.php.net/ChangeLog-4.php
www.php.net/ChangeLog-5.php#5.2.4
www.php.net/releases/4_4_8.php
www.php.net/releases/5_2_4.php
www.redhat.com/support/errata/RHSA-2007-0082.html
www.redhat.com/support/errata/RHSA-2007-0162.html
www.securityfocus.com/archive/1/466166/100/0/threaded
www.securityfocus.com/bid/22764
www.securitytracker.com/id?1017771
www.ubuntu.com/usn/usn-549-2
issues.rpath.com/browse/RPL-1268
launchpad.net/bugs/173043
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017
usn.ubuntu.com/549-1/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
95.6%