{ "id": "CVE-2007-1413", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-12T23:19:00.000", "lastModified": "2017-10-11T01:31:51.610", "vulnStatus": "Modified", "evaluatorImpact": "Failed exploit attempts will likely cause a denial of serivce on the webserver.", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id)." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la funci\u00f3n snmpget en la extensi\u00f3n snmp en PHP versi\u00f3n 5.2.3 y anteriores, incluyendo a PHP versi\u00f3n 4.4.6 y probablemente otras versiones 4 de PHP, permite a atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario por medio de un valor largo en el tercer argumento (id del objeto)." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Not vulnerable. The php-snmp package as shipped with Red Hat Enterprise Linux 4 and 5 use net-snmp which is not vulnerable to this issue.\n", "lastModified": "2007-03-19T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.2.3", "matchCriteriaId": "0CDA10FE-C930-4399-A0AE-1C9A6D547FB9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "84B70263-37AA-4539-A286-12038A3792C6" } ] } ] } ], "references": [ { "url": "http://retrogod.altervista.org/php_446_snmpget_local_bof.html", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/24440", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/22893", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35517", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/3439", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/4204", "source": "cve@mitre.org" } ] }