The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.
http://docs.info.apple.com/article.html?artnum=306172
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
http://secunia.com/advisories/24542
http://secunia.com/advisories/25056
http://secunia.com/advisories/25057
http://secunia.com/advisories/25445
http://secunia.com/advisories/26235
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://us2.php.net/releases/4_4_7.php
http://us2.php.net/releases/5_2_2.php
http://www.novell.com/linux/security/advisories/2007_32_php.html
http://www.php-security.org/MOPB/MOPB-24-2007.html
http://www.securityfocus.com/bid/22990
http://www.securityfocus.com/bid/25159
Source: MITRE
Published: 2007-03-16
Updated: 2018-10-19
Type: NVD-CWE-Other
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM
OR
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to 4.4.6 (inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.2.1 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
29378 | SuSE 10 Security Update : PHP5 (ZYPP Patch Number 3290) | Nessus | SuSE Local Security Checks | high |
28053 | Ubuntu 6.06 LTS / 6.10 / 7.04 : php5 vulnerabilities (USN-455-1) | Nessus | Ubuntu Local Security Checks | high |
27150 | openSUSE 10 Security Update : apache2-mod_php5 (apache2-mod_php5-3289) | Nessus | SuSE Local Security Checks | high |
25340 | GLSA-200705-19 : PHP: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
25159 | PHP < 4.4.7 / 5.2.2 Multiple Vulnerabilities | Nessus | CGI abuses | high |