Vulnerability Description
PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 4.2.0 |
References
- http://marc.info/?l=bugtraq&m=102734515923277&w=2
- http://marc.info/?l=bugtraq&m=102734516023281&w=2
- http://www.cert.org/advisories/CA-2002-21.htmlUS Government Resource
- http://www.iss.net/security_center/static/9635.php
- http://www.kb.cert.org/vuls/id/929115US Government Resource
- http://marc.info/?l=bugtraq&m=102734515923277&w=2
- http://marc.info/?l=bugtraq&m=102734516023281&w=2
- http://www.cert.org/advisories/CA-2002-21.htmlUS Government Resource
- http://www.iss.net/security_center/static/9635.php
- http://www.kb.cert.org/vuls/id/929115US Government Resource
FAQ
What is CVE-2002-0717?
CVE-2002-0717 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which genera...
How severe is CVE-2002-0717?
CVE-2002-0717 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0717?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.