Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-1718

Опубликовано: 28 мар. 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Средний
CVSS2: 7.8

Описание

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.9
devel

released

5.2.3-1ubuntu5
edgy

released

5.1.6-1ubuntu2.6
feisty

released

5.2.1-0ubuntu1.4
upstream

needs-triage

Показывать по

EPSS

Процентиль: 95%
0.16424
Средний

7.8 High

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.

nvd
больше 18 лет назад

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.

debian
больше 18 лет назад

CRLF injection vulnerability in the mail function in PHP 4.0.0 through ...

github
около 3 лет назад

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.

EPSS

Процентиль: 95%
0.16424
Средний

7.8 High

CVSS2