CVE-2007-1413

Published Mar 12, 2007

Last updated 7 years ago

Overview

Description
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-119

Evaluator

Comment
-
Impact
Failed exploit attempts will likely cause a denial of serivce on the webserver.
Solution
Failed exploit attempts will likely cause a denial of serivce on the webserver.

Vendor comments

  • Red HatNot vulnerable. The php-snmp package as shipped with Red Hat Enterprise Linux 4 and 5 use net-snmp which is not vulnerable to this issue.

Configurations