#VU110419 Heap-based buffer overflow in PHP - CVE-2007-1777
Published: October 30, 2018 / Updated: June 9, 2025
PHP
PHP Group
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5. A remote attacker can use a ZIP archive that contains an entry with a length value of 0xffffffff to trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://secunia.com/advisories/25025
- http://secunia.com/advisories/25062
- http://www.debian.org/security/2007/dsa-1282
- http://www.debian.org/security/2007/dsa-1283
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
- http://www.php-security.org/MOPB/MOPB-35-2007.html
- http://www.securityfocus.com/bid/23169
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33652