Vulnerability Description
Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 3.0 |
References
- http://secunia.com/advisories/25025
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1282
- http://www.debian.org/security/2007/dsa-1283
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
- http://www.php-security.org/MOPB/MOPB-35-2007.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/23169Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33652
- http://secunia.com/advisories/25025
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1282
- http://www.debian.org/security/2007/dsa-1283
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
- http://www.php-security.org/MOPB/MOPB-35-2007.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/23169Exploit
FAQ
What is CVE-2007-1777?
CVE-2007-1777 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, whic...
How severe is CVE-2007-1777?
CVE-2007-1777 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1777?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.