Vulnerability Description
PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.2.1 |
References
- http://secunia.com/advisories/24630
- http://us2.php.net/releases/5_2_2.php
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
- http://www.php-security.org/MOPB/MOPB-29-2007.htmlExploit
- http://www.securityfocus.com/bid/23105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33170
- http://secunia.com/advisories/24630
- http://us2.php.net/releases/5_2_2.php
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
- http://www.php-security.org/MOPB/MOPB-29-2007.htmlExploit
- http://www.securityfocus.com/bid/23105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33170
FAQ
What is CVE-2007-1649?
CVE-2007-1649 is a vulnerability with a CVSS score of 7.8 (HIGH). PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the numbe...
How severe is CVE-2007-1649?
CVE-2007-1649 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1649?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.