CVE-2007-3806

NameCVE-2007-3806
DescriptionThe glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1572-1, DSA-1578-1, DTSA-61-1
NVD severitymedium (attack range: remote)
Debian Bugs441433

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)wheezy (security), wheezy5.4.45-0+deb7u2fixed
jessie5.6.19+dfsg-0+deb8u1fixed
jessie (security)5.6.20+dfsg-0+deb8u1fixed
stretch, sid5.6.20+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php4source(unstable)(unfixed)medium
php4sourceetch6:4.4.4-8+etch6mediumDSA-1578-1
php5source(unstable)5.2.4-1medium441433
php5sourceetch5.2.0-8+etch11mediumDSA-1572-1
php5sourcelenny5.2.3-1+lenny1mediumDTSA-61-1

Notes

[etch] - php5 <no-dsa> (requires malicious script)
[etch] - php4 <no-dsa> (requires malicious script)
[sarge] - php4 <no-dsa> (requires malicious script)

Search for package or bug name: Reporting problems