Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1380

Опубликовано: 10 мар. 2007
Источник: debian
EPSS Средний

Описание

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.2.0-8+etch1etchpackage
php4fixed6:4.4.6-1package
php5fixed5.2.0-11package

EPSS

Процентиль: 94%
0.12408
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

redhat
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

nvd
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

github
около 3 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

EPSS

Процентиль: 94%
0.12408
Средний