Improper Input Validation Affecting php package, versions [,5.2.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PHP-2335526
  • published12 Jan 2022
  • disclosed20 Nov 2007
  • creditUnknown

Introduced: 20 Nov 2007

CVE-2007-6039  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade php to version 5.2.5 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation. PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.

CVSS Scores

version 3.1