Vulnerability Description
Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.2.0 |
References
- http://www.securityfocus.com/bid/25414
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36118
- https://www.exploit-db.com/exploits/4293
- http://www.securityfocus.com/bid/25414
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36118
- https://www.exploit-db.com/exploits/4293
FAQ
What is CVE-2007-4441?
CVE-2007-4441 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the w...
How severe is CVE-2007-4441?
CVE-2007-4441 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4441?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.