vendor:
PHP
by:
Unknown
7.5
CVSS
HIGH
Integer-Overflow
190
CWE
Product Name: PHP
Affected Version From: PHP 5.2.1
Affected Version To: PHP 5.2.1
Patch Exists: NO
Related CWE: CVE-2007-3996
CPE: a:php:php:5.2.1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0720/, https://www.rapid7.com/db/vulnerabilities/php-cve-2007-3996/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0889/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0890/, https://www.rapid7.com/db/vulnerabilities/php-cve-2007-4657/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0917/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2007-3996/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2007-4657/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2007-3996/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0891/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0889/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0890/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0888/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0888/
Platforms Tested:
Unknown
Integer-Overflow Vulnerabilities in PHP’s GD Extension
PHP's GD extension is prone to two integer-overflow vulnerabilities because it fails to ensure that integer values aren't overrun. Successfully exploiting these issues allows attackers to crash the affected application, potentially denying service to legitimate users. Due to the nature of the issues, code execution may also be possible, but this has not been confirmed.
Mitigation:
Upgrade to a non-vulnerable version of PHP or apply patches provided by the vendor.