Vulnerabilities > CVE-2003-0166 - Unspecified vulnerability in PHP

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
php
nessus
exploit available

Summary

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions.

Exploit-Db

  • descriptionPHP 4.x socket_recv() Signed Integer Memory Corruption Vulnerability. CVE-2003-0166. Dos exploit for php platform
    idEDB-ID:22425
    last seen2016-02-02
    modified2003-03-26
    published2003-03-26
    reporterSir Mordred
    sourcehttps://www.exploit-db.com/download/22425/
    titlePHP 4.x socket_recv Signed Integer Memory Corruption Vulnerability
  • descriptionPHP 4.x socket_recvfrom() Signed Integer Memory Corruption Vulnerability. CVE-2003-0166 . Dos exploit for php platform
    idEDB-ID:22426
    last seen2016-02-02
    modified2003-03-26
    published2003-03-26
    reporterSir Mordred
    sourcehttps://www.exploit-db.com/download/22426/
    titlePHP 4.x socket_recvfrom Signed Integer Memory Corruption Vulnerability
  • descriptionPHP 4.3 socket_iovec_alloc() Integer Overflow Vulnerability. CVE-2003-0166. Dos exploit for php platform
    idEDB-ID:22419
    last seen2016-02-02
    modified2003-03-25
    published2003-03-25
    reporterSir Mordred
    sourcehttps://www.exploit-db.com/download/22419/
    titlePHP 4.3 socket_iovec_alloc Integer Overflow Vulnerability

Nessus

NASL familyCGI abuses
NASL idPHP_SOCKET_IOVEC_ALLOC_OVERFLOW.NASL
descriptionThe remote host is running a version of PHP that is older than 4.3.2. There is a flaw in this version that could allow an attacker who has the ability to inject an arbitrary argument to the function socket_iovec_alloc() to crash the remote service and possibly to execute arbitrary code. For this attack to work, PHP has to be compiled with the option --enable-sockets (which is disabled by default), and an attacker needs to be able to pass arbitrary values to socket_iovec_alloc(). Other functions are vulnerable to such flaws : openlog(), socket_recv(), socket_recvfrom() and emalloc()
last seen2020-06-01
modified2020-06-02
plugin id11468
published2003-03-25
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11468
titlePHP socket_iovec_alloc() Function Overflow