CVE-2007-4661

critical

Description

The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow. NOTE: this is due to an incomplete fix for CVE-2007-2872.

References

https://usn.ubuntu.com/549-1/

https://launchpad.net/bugs/173043

https://issues.rpath.com/browse/RPL-1702

http://www.ubuntu.com/usn/usn-549-2

http://www.php.net/releases/5_2_4.php

http://www.php.net/ChangeLog-5.php#5.2.4

http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml

http://secunia.com/advisories/28658

http://secunia.com/advisories/27864

http://secunia.com/advisories/27102

http://secunia.com/advisories/26838

http://secunia.com/advisories/26642

http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html

Details

Source: Mitre, NVD

Published: 2007-09-04

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical