CVE-2007-1883

HIGH

Description

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.

References

http://secunia.com/advisories/24542

http://secunia.com/advisories/27102

http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml

http://www.php-security.org/MOPB/MOPB-37-2007.html

https://exchange.xforce.ibmcloud.com/vulnerabilities/33750

Details

Source: MITRE

Published: 2007-04-06

Updated: 2018-10-30

Risk Information

CVSS v2.0

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH