Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-1001
Modified
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-06 Apr, 2007 | 00:19
Updated At-30 Oct, 2018 | 16:25

Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.0
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.2
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.5
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.6
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.0
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.1
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.2
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2
cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
The PHP Group
php
>>php>>4.2.0
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.1
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.2
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.3
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.0
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.1
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.2
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.3
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.4
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.5
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.6
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.7
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.8
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.9
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.10
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.11
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.0
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.1
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.2
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.3
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.4
cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.5
cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.6
cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-02-14T00:00:00

This issue was fixed in php package updates for Red Hat Enterprise Linux and Red Hat Application Stack: http://rhn.redhat.com/cve/CVE-2007-1001.html This issue did not affect the versions of gd as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

References
HyperlinkSourceResource
http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1secalert@redhat.com
N/A
http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?revision=1.2.4.1.8.1&view=markupsecalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=306172secalert@redhat.com
N/A
http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.htmlsecalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2007-0155.htmlsecalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24814secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24909secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24924secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24945secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24965secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25056secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25151secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25445secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26235secalert@redhat.com
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xmlsecalert@redhat.com
N/A
http://us2.php.net/releases/4_4_7.phpsecalert@redhat.com
N/A
http://us2.php.net/releases/5_2_2.phpsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2007_32_php.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-0153.htmlsecalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0162.htmlsecalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/archive/1/464957/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/466166/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/23357secalert@redhat.com
N/A
http://www.securityfocus.com/bid/25159secalert@redhat.com
N/A
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.470053secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1269secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2007/2732secalert@redhat.com
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33453secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-1268secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10179secalert@redhat.com
N/A
Change History
0Changes found

Details not found