CVE-2007-1885

critical

Description

Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/33767

http://www.vupen.com/english/advisories/2007/2374

http://www.vupen.com/english/advisories/2007/1991

http://www.securityfocus.com/bid/23233

http://www.php.net/releases/5_2_1.php

http://secunia.com/advisories/25850

http://secunia.com/advisories/25423

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506

Details

Source: Mitre, NVD

Published: 2007-04-06

Updated: 2018-10-30

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical