Vulnerability Description
Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.0.0 |
References
- http://secunia.com/advisories/25056
- http://secunia.com/advisories/25057
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1283
- http://www.novell.com/linux/security/advisories/2007_32_php.html
- http://www.php-security.org/MOPB/MOPB-42-2007.html
- http://www.securityfocus.com/bid/23237Exploit
- http://www.ubuntu.com/usn/usn-455-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33729
- http://secunia.com/advisories/25056
- http://secunia.com/advisories/25057
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1283
- http://www.novell.com/linux/security/advisories/2007_32_php.html
- http://www.php-security.org/MOPB/MOPB-42-2007.html
FAQ
What is CVE-2007-1824?
CVE-2007-1824 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending i...
How severe is CVE-2007-1824?
CVE-2007-1824 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1824?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.