Vulnerability Details : CVE-2007-3806
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2007-3806
- cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
Threat overview for CVE-2007-3806
Top countries where our scanners detected CVE-2007-3806
Top open port discovered on systems with this issue
80
IPs affected by CVE-2007-3806 1,213
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-3806!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-3806
3.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3806
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2007-3806
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-3806
-
Red Hat 2007-09-05Not vulnerable. This issue only affected PHP on Windows platforms.
References for CVE-2007-3806
-
http://www.php.net/ChangeLog-5.php#5.2.4
PHP: PHP 5 ChangeLog
-
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
-
http://osvdb.org/36085
-
http://secunia.com/advisories/27102
About Secunia Research | FlexeraVendor Advisory
-
http://secunia.com/advisories/30288
Vendor Advisory
-
http://secunia.com/advisories/26642
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/bid/24922
-
http://www.vupen.com/english/advisories/2007/2547
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
-
http://www.exploit-db.com/exploits/4181
-
http://secunia.com/advisories/30158
Vendor Advisory
-
http://www.debian.org/security/2008/dsa-1578
-
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
PHP: Multiple vulnerabilities (GLSA 200710-02) — Gentoo security
-
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
-
http://www.php.net/releases/5_2_4.php
PHP: PHP 5.2.4 Release Announcement
-
http://secunia.com/advisories/26085
Vendor Advisory
-
http://www.debian.org/security/2008/dsa-1572
-
http://www.securityfocus.com/bid/25498
Jump to