![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.100600 |
Category: | Web application abuses |
Title: | PHP Imap_Mail_Compose() Function Buffer Overflow Vulnerability |
Summary: | PHP is prone to a buffer-overflow vulnerability because the; application fails to perform boundary checks before copying; user-supplied data to insufficiently sized memory buffers. |
Description: | Summary: PHP is prone to a buffer-overflow vulnerability because the application fails to perform boundary checks before copying user-supplied data to insufficiently sized memory buffers. Vulnerability Impact: An attacker can exploit this issue to execute arbitrary machine code in the context of the affected webserver. Failed exploit attempts will likely crash the webserver, denying service to legitimate users. Affected Software/OS: This issue affects PHP versions prior to 4.4.5 and 5.2.1. Solution: The vendor released PHP 4.4.5 and 5.2.1 to address this issue. Please see the references for more information. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-1825 BugTraq ID: 23234 http://www.securityfocus.com/bid/23234 http://www.php-security.org/MOPB/MOPB-40-2007.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10377 XForce ISS Database: php-imapmailcompose-bo(33534) https://exchange.xforce.ibmcloud.com/vulnerabilities/33534 |
Copyright | Copyright (C) 2010 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |