SB2017092922 - Multiple vulnerabilities in PHP
Published: September 29, 2017 Updated: June 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2007-4586)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to the iis_getservicestate function, related to the ServiceId argument to the (1) fnStartService, (2) fnGetServiceState, (3) fnStopService, and possibly other functions.
2) Input validation error (CVE-ID: CVE-2007-4441)
The vulnerability allows a local user to read and manipulate data.
Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.
3) Input validation error (CVE-ID: CVE-2007-0448)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.
4) Input validation error (CVE-ID: CVE-2007-1889)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.
5) Deserialization of Untrusted Data (CVE-ID: CVE-2007-1701)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:". Successful exploitation requires that variable "register_globals" is enabled.
6) Input validation error (CVE-ID: CVE-2007-1584)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '