Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1890

Опубликовано: 06 апр. 2007
Источник: debian
EPSS Низкий

Описание

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4removedpackage
php5removedpackage

Примечания

  • local code execution only, possibly only on FreeBSD

EPSS

Процентиль: 89%
0.05063
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

nvd
больше 18 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

github
больше 3 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

EPSS

Процентиль: 89%
0.05063
Низкий