CVE Reference: CVE-2007-4782

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2007-4782

Description:
PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/36457
  http://xforce.iss.net/xforce/xfdb/36461

UBUNTU
  http://www.ubuntu.com/usn/usn-628-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html

SREASON
  http://securityreason.com/securityalert/3109

SAID
  Secunia Advisory: SA27102
  Secunia Advisory: SA28658
  Secunia Advisory: SA30828
  Secunia Advisory: SA31119
  Secunia Advisory: SA31200

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0544.html
  http://www.redhat.com/support/errata/RHSA-2008-0582.html
  http://www.redhat.com/support/errata/RHSA-2008-0545.html
  http://www.redhat.com/support/errata/RHSA-2008-0505.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10897

OSVDB
  38686

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
  http://www.mandriva.com/security/advisories?name=MDVSA-2009:022

GENTOO
  http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml

FEDORA

BUGTRAQ
  http://www.securityfocus.com/archive/1/478726/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/478626/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/478630/100/0/threaded


Return to the previous page.