CVE-2007-1885
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/04/2007
Last modified:
09/04/2025
Description
Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://secunia.com/advisories/25423
- http://secunia.com/advisories/25850
- http://www.php-security.org/MOPB/MOPB-39-2007.html
- http://www.php.net/releases/5_2_1.php
- http://www.securityfocus.com/bid/23233
- http://www.vupen.com/english/advisories/2007/1991
- http://www.vupen.com/english/advisories/2007/2374
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33767
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://secunia.com/advisories/25423
- http://secunia.com/advisories/25850
- http://www.php-security.org/MOPB/MOPB-39-2007.html
- http://www.php.net/releases/5_2_1.php
- http://www.securityfocus.com/bid/23233
- http://www.vupen.com/english/advisories/2007/1991
- http://www.vupen.com/english/advisories/2007/2374
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33767



