7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
php is vulnerable to arbitrary code execution. A heap buffer overflow flaw was found in the PHP ‘xmlrpc’ extension. A PHP script which implements an XML-RPC server using this extension could allow a remote attacker to execute arbitrary code as the ‘apache’ user. Note that this flaw does not affect PHP applications using the pure-PHP XML_RPC class provided in /usr/share/pear.
lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
osvdb.org/34674
secunia.com/advisories/25187
secunia.com/advisories/25191
secunia.com/advisories/25255
secunia.com/advisories/25445
secunia.com/advisories/25660
secunia.com/advisories/25938
secunia.com/advisories/25945
secunia.com/advisories/26048
secunia.com/advisories/26102
secunia.com/advisories/27377
security.gentoo.org/glsa/glsa-200705-19.xml
support.avaya.com/elmodocs2/security/ASA-2007-231.htm
us2.php.net/releases/4_4_7.php
us2.php.net/releases/5_2_2.php
www.debian.org/security/2007/dsa-1330
www.debian.org/security/2007/dsa-1331
www.mandriva.com/security/advisories?name=MDKSA-2007:102
www.mandriva.com/security/advisories?name=MDKSA-2007:103
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2007-0349.html
www.redhat.com/support/errata/RHSA-2007-0355.html
www.securityfocus.com/bid/23813
www.securitytracker.com/id?1018024
www.trustix.org/errata/2007/0017/
www.ubuntu.com/usn/usn-485-1
www.vupen.com/english/advisories/2007/2187
access.redhat.com/errata/RHSA-2007:0348
issues.rpath.com/browse/RPL-1693
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11257
rhn.redhat.com/errata/RHSA-2007-0348.html