PHP Ovrimos Extension ovrimos_close Function Arbtirary Code Execution

2007-03-06T05:21:27
ID OSVDB:34691
Type osvdb
Reporter Stefan Esser(sesser@hardened-php.net)
Modified 2007-03-06T05:21:27

Description

Vulnerability Description

PHP contains a flaw that may allow a context-dependent attacker to gain elevated privileges. The issue is due to the ovrimos_close function in the Ovrimos Extension not properly sanitizing user input. This may allow an attacker to manipulate memory to execute arbitrary code.

Solution Description

Upgrade to version 4.4.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PHP contains a flaw that may allow a context-dependent attacker to gain elevated privileges. The issue is due to the ovrimos_close function in the Ovrimos Extension not properly sanitizing user input. This may allow an attacker to manipulate memory to execute arbitrary code.

References:

Vendor URL: http://www.php.net/ Vendor Specific Solution URL: http://us2.php.net/downloads.php Vendor Specific News/Changelog Entry: http://us2.php.net/releases/4_4_5.php Vendor Specific News/Changelog Entry: http://us2.php.net/ChangeLog-4.php#4.4.5 Related OSVDB ID: 32779 Other Advisory URL: http://www.php-security.org/MOPB/MOPB-13-2007.html CVE-2007-1379 Bugtraq ID: 22833