Vulnerabilities > CVE-2007-1399
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 2 |
Exploit-Db
description | PHP 5.2.0 / PHP with PECL ZIP <= 1.8.3 zip:// URL Wrapper BoF Exploit. CVE-2007-1399. Local exploit for linux platform |
id | EDB-ID:3440 |
last seen | 2016-01-31 |
modified | 2007-03-09 |
published | 2007-03-09 |
reporter | Stefan Esser |
source | https://www.exploit-db.com/download/3440/ |
title | PHP 5.2.0 / PHP with PECL ZIP <= 1.8.3 zip:// URL Wrapper BoF Exploit |
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1330.NASL description Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-1399 Stefan Esser discovered that a buffer overflow in the zip extension allows the execution of arbitrary code. - CVE-2007-1864 It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code. The oldstable distribution (sarge) doesn last seen 2020-06-01 modified 2020-06-02 plugin id 25677 published 2007-07-10 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25677 title Debian DSA-1330-1 : php5 - several vulnerabilities NASL family CGI abuses NASL id PHP_4_4_7_OR_5_2_2.NASL description According to its banner, the version of PHP installed on the remote host is older than 4.4.7 / 5.2.2. Such versions may be affected by several issues, including buffer overflows in the GD library. last seen 2020-06-01 modified 2020-06-02 plugin id 25159 published 2007-05-04 reporter This script is Copyright (C) 2007-2018 Westpoint Limited. source https://www.tenable.com/plugins/nessus/25159 title PHP < 4.4.7 / 5.2.2 Multiple Vulnerabilities NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-187.NASL description Numerous vulnerabilities were discovered in the PHP scripting language that are corrected with this update. An integer overflow in the substr_compare() function allows context-dependent attackers to read sensitive memory via a large value in the length argument. This only affects PHP5 (CVE-2007-1375). A stack-based buffer overflow in the zip:// URI wrapper in PECL ZIP 1.8.3 and earlier allowes remote attackers to execute arbitrary code via a long zip:// URL. This only affects Corporate Server 4.0 (CVE-2007-1399). A CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter could allow an attacker to inject arbitrary email headers via a special email address. This only affects Mandriva Linux 2007.1 (CVE-2007-1900). The mcrypt_create_iv() function calls php_rand_r() with an uninitialized seed variable, thus always generating the same initialization vector, which may allow an attacker to decrypt certain data more easily because of the guessable encryption keys (CVE-2007-2727). The soap extension calls php_rand_r() with an uninitialized seec variable, which has unknown impact and attack vectors; an issue similar to that affecting mcrypt_create_iv(). This only affects PHP5 (CVE-2007-2728). The substr_count() function allows attackers to obtain sensitive information via unspecified vectors. This only affects PHP5 (CVE-2007-2748). An infinite loop was found in the gd extension that could be used to cause a denial of service if a script were forced to process certain PNG images from untrusted sources (CVE-2007-2756). An integer overflow flaw was found in the chunk_split() function that ould possibly execute arbitrary code as the apache user if a remote attacker was able to pass arbitrary data to the third argument of chunk_split() (CVE-2007-2872). A flaw in the PHP session cookie handling could allow an attacker to create a cross-site cookie insertion attack if a victim followed an untrusted carefully-crafted URL (CVE-2007-3799). Various integer overflow flaws were discovered in the PHP gd extension that could allow a remote attacker to execute arbitrary code as the apache user (CVE-2007-3996). A flaw in the wordwrap() frunction could result in a denial of ervice if a remote attacker was able to pass arbitrary data to the function (CVE-2007-3998). A flaw in the money_format() function could result in an information leak or denial of service if a remote attacker was able to pass arbitrary data to this function; this situation would be unlikely however (CVE-2007-4658). A bug in the PHP session cookie handling could allow an attacker to stop a victim from viewing a vulnerable website if the victim first visited a malicious website under the control of the attacker who was able to use that page to set a cookie for the vulnerable website (CVE-2007-4670). Updated packages have been patched to prevent these issues. In addition, PECL ZIP version 1.8.10 is being provided for Corporate Server 4.0. last seen 2020-06-01 modified 2020-06-02 plugin id 26107 published 2007-09-24 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26107 title Mandrake Linux Security Advisory : php (MDKSA-2007:187)
Statements
contributor | Mark J Cox |
lastmodified | 2007-04-16 |
organization | Red Hat |
statement | Not vulnerable. The zip extension was not shipped in versions of PHP provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1. |
References
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
- http://secunia.com/advisories/24471
- http://secunia.com/advisories/24471
- http://secunia.com/advisories/24514
- http://secunia.com/advisories/24514
- http://secunia.com/advisories/25938
- http://secunia.com/advisories/25938
- http://www.debian.org/security/2007/dsa-1330
- http://www.debian.org/security/2007/dsa-1330
- http://www.osvdb.org/32782
- http://www.osvdb.org/32782
- http://www.php-security.org/MOPB/MOPB-16-2007.html
- http://www.php-security.org/MOPB/MOPB-16-2007.html
- http://www.securityfocus.com/bid/22883
- http://www.securityfocus.com/bid/22883
- http://www.vupen.com/english/advisories/2007/0898
- http://www.vupen.com/english/advisories/2007/0898
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32889
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32889