CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
86.8%
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 4.0 | cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:* |
php | php | 4.0.0 | cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* |
osvdb.org/39177
secunia.com/advisories/25057
www.attrition.org/pipermail/vim/2007-April/001540.html
www.mandriva.com/security/advisories?name=MDKSA-2007:091
www.php-security.org/MOPB/MOPB-41-2007.html
www.sqlite.org/cvstrac/rlog?f=sqlite/src/encode.c
www.ubuntu.com/usn/usn-455-1
exchange.xforce.ibmcloud.com/vulnerabilities/38518