Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-3998

Опубликовано: 30 авг. 2007
Источник: redhat
EPSS Низкий

Описание

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.

Отчет

This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=276081php floating point exception inside wordwrap

EPSS

Процентиль: 90%
0.05186
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.

nvd
почти 18 лет назад

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.

debian
почти 18 лет назад

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, d ...

github
больше 3 лет назад

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.

oracle-oval
почти 18 лет назад

ELSA-2007-0890: Moderate: php security update (MODERATE)

EPSS

Процентиль: 90%
0.05186
Низкий