Lucene search

K
ubuntucveUbuntu.comUB:CVE-2007-3294
HistoryJun 20, 2007 - 12:00 a.m.

CVE-2007-3294

2007-06-2000:00:00
ubuntu.com
ubuntu.com
7

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.7%

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP
5.2.3 and possibly other products, allow context-dependent attackers to
execute arbitrary code via (1) a long second argument to the
tidy_parse_string function or (2) an unspecified vector to the
tidy_repair_string function. NOTE: this might only be an issue in
environments where vsnprintf is implemented as a wrapper for vsprintf.

Notes

Author Note
kees local malicious script

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.7%

Related for UB:CVE-2007-3294