Arbitrary Code Execution Affecting php package, versions [,4.4.5)[5.2.0,5.2.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.31% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-PHP-2335547
  • published12 Jan 2022
  • disclosed6 Apr 2007
  • creditUnknown

Introduced: 6 Apr 2007

CVE-2007-1884  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade php to version 4.4.5, 5.2.1 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Execution. Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary memory location.

References

CVSS Scores

version 3.1