SB2018101912 - Multiple vulnerabilities in PHP 



SB2018101912 - Multiple vulnerabilities in PHP

Published: October 19, 2018 Updated: June 13, 2025

Security Bulletin ID SB2018101912
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 10% Medium 80% Low 10%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2007-2748)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.


2) Buffer overflow (CVE-ID: CVE-2007-1864)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.


3) Input validation error (CVE-ID: CVE-2007-1900)

The vulnerability allows a remote non-authenticated attacker to corrupt data.

CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a ' ' character, which causes a regular expression to ignore the subsequent part of the address string.


4) Buffer overflow (CVE-ID: CVE-2007-1709)

The vulnerability allows a local user to read and manipulate data.

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.


5) Input validation error (CVE-ID: CVE-2007-1649)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.


6) Input validation error (CVE-ID: CVE-2007-1521)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.


7) Input validation error (CVE-ID: CVE-2007-1522)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.


8) Stack-based buffer overflow (CVE-ID: CVE-2007-1399)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Input validation error (CVE-ID: CVE-2007-1375)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.


10) Input validation error (CVE-ID: CVE-2007-0911)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).


Remediation

Install update from vendor's website.

References