CVE-2007-4657
Publication date 4 September 2007
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.
Status
Package | Ubuntu Release | Status |
---|---|---|
php4 | 9.10 karmic | Not in release |
9.04 jaunty | Not in release | |
8.10 intrepid | Not in release | |
8.04 LTS hardy | Not in release | |
7.10 gutsy | Not in release | |
7.04 feisty | Not in release | |
6.10 edgy | Ignored end of life, was needed | |
6.06 LTS dapper | Ignored end of life | |
php5 | 9.10 karmic |
Not affected
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy |
Fixed 5.2.3-1ubuntu6.1
|
|
7.04 feisty |
Fixed 5.2.1-0ubuntu1.5
|
|
6.10 edgy |
Fixed 5.1.6-1ubuntu2.7
|
|
6.06 LTS dapper |
Fixed 5.1.2-1ubuntu3.10
|
Notes
kees
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/string.c?r1=1.640&r2=1.641, prior to line 7667 201-strspn-oob-read.patch
Patch details
Package | Patch details |
---|---|
php4 |