7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.085 Low
EPSS
Percentile
93.5%
It was discovered that the patch for CVE-2007-4659 could lead to
regressions in some scenarios. The fix has been reverted for now,
a revised update will be provided in a future PHP DSA.
For reference the original advisory below:
Several remote vulnerabilities have been discovered in PHP, a
server-side, HTML-embedded scripting language. The Common
Vulnerabilities and Exposures project identifies the following
problems:
It was discovered that the session_start() function allowed the
insertion of attributes into the session cookie.
Mattias Bengtsson and Philip Olausson discovered that a
programming error in the implementation of the wordwrap() function
allowed denial of service through an infinite loop.
Stanislav Malyshev discovered that a format string vulnerability
in the money_format() function could allow the execution of
arbitrary code.
Stefan Esser discovered that execution control flow inside the
zend_alter_ini_entry() function is handled incorrectly in case
of a memory limit violation.
Gerhard Wagner discovered an integer overflow inside the
chunk_split() function.
Rasmus Lerdorf discovered that incorrect parsing of multibyte
sequences may lead to disclosure of memory contents.
It was discovered that the output_add_rewrite_var() function could
leak session ID information, resulting in information disclosure.
This update also fixes two bugs from the PHP 5.2.4 release which
don’t have security impact according to the Debian PHP security policy
(CVE-2007-4657 and CVE-2007-4662), but which are fixed nonetheless.
The old stable distribution (sarge) doesn’t contain php5.
For the stable distribution (etch), these problems have been fixed in
version 5.2.0-8+etch10.
For the unstable distribution (sid), these problems have been fixed
in version 5.2.4-1, with the exception of CVE-2007-5898 and
CVE-2007-5899, which will be fixed soon. Please note that Debian’s
version of PHP is hardened with the Suhosin patch beginning with
version 5.2.4-1, which renders several vulnerabilities ineffective.
We recommend that you upgrade your php5 packages.
CPE | Name | Operator | Version |
---|---|---|---|
php5 | eq | 5.2.0-8+etch1 | |
php5 | eq | 5.2.0-8+etch3 | |
php5 | eq | 5.2.0-8+etch4 | |
php5 | eq | 5.2.0-8+etch5~pu1 | |
php5 | eq | 5.2.0-8+etch6 | |
php5 | eq | 5.2.0-8+etch7 | |
php5 | eq | 5.2.0-8+etch8 | |
php5 | eq | 5.2.0-8+etch9~bpo31+1 |