| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability was found in PHP. It has been rated as critical. This affects an unknown function. Performing a manipulation results in memory corruption. This vulnerability is reported as CVE-2007-1475. Moreover, an exploit is present.
Details
A vulnerability was found in PHP (Programming Language Software). It has been classified as critical. This affects an unknown function. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.
The weakness was disclosed 03/16/2007 by rgod (Website). The advisory is shared at securityfocus.com. This vulnerability is uniquely identified as CVE-2007-1475 since 03/16/2007. The attack needs to approached within the local network. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available.
The exploit is shared for download at securityfocus.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (33019), SecurityFocus (BID 22976†), Secunia (SA24529†) and Vulnerability Center (SBV-37308†). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
- 3.0
- 3.0.6
- 3.0.7
- 3.0.8
- 3.0.9
- 4.0
- 4.0.0
- 4.0.1
- 4.0.2
- 4.0.3
- 4.0.4
- 4.0.5
- 4.0.6
- 4.0.7
- 4.1.0
- 4.1.1
- 4.1.2
- 4.2.0
- 4.2.1
- 4.2.2
- 4.2.3
- 4.3
- 4.3.1
- 4.3.2
- 4.3.3
- 4.3.4
- 4.3.5
- 4.3.6
- 4.3.7
- 4.3.8
- 4.3.9
- 4.3.10
- 4.3.11
- 4.4.0
- 4.4.1
- 4.4.2
- 4.4.3
- 4.4.4
- 4.4.5
- 4.4.6
License
Website
- Product: https://www.php.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
03/15/2007 🔍03/15/2007 🔍
03/16/2007 🔍
03/16/2007 🔍
03/16/2007 🔍
11/18/2012 🔍
03/13/2015 🔍
08/29/2024 🔍
Sources
Product: php.orgAdvisory: securityfocus.com⛔
Researcher: rgod
Status: Not defined
CVE: CVE-2007-1475 (🔍)
GCVE (CVE): GCVE-0-2007-1475
GCVE (VulDB): GCVE-100-35637
X-Force: 33019
SecurityFocus: 22976 - PHP Interbase Extension Multiple Remote Buffer Overflow Vulnerabilities
Secunia: 24529
Vulnerability Center: 37308 - PHP 4.4.6 and Earlier Remote Arbitrary Code Execution Vulnerability via a Long Argument, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 03/13/2015 12:16Updated: 08/29/2024 05:06
Changes: 03/13/2015 12:16 (53), 04/21/2017 13:21 (8), 07/13/2021 20:03 (3), 08/29/2024 05:06 (17)
Complete: 🔍
Cache ID: 216::103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.