PHP ZVAL Reference Counter Integer Overflow Vulnerability
BID:22765
Info
PHP ZVAL Reference Counter Integer Overflow Vulnerability
| Bugtraq ID: | 22765 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-1286 CVE-2007-1383 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Mar 01 2007 12:00AM |
| Updated: | Mar 19 2015 09:19AM |
| Credit: | The original discoverer of this issue is currently unknown. |
| Vulnerable: |
Turbolinux Turbolinux Server 10.0 x86 Turbolinux Turbolinux Server 10.0 Turbolinux Turbolinux Server 8.0 Turbolinux Turbolinux Desktop 10.0 Turbolinux Turbolinux 10 F... TurboLinux Personal TurboLinux Multimedia Turbolinux Home Turbolinux Appliance Server Workgroup Edition 1.0 Turbolinux Appliance Server Hosting Edition 1.0 Turbolinux Appliance Server 1.0 Workgroup Edition Turbolinux Appliance Server 1.0 Hosting Edition Turbolinux Appliance Server 2.0 Trustix Secure Linux 2.2 Trustix Secure Enterprise Linux 2.0 SuSE SUSE Linux Enterprise Server 8 SuSE SUSE Linux Enterprise Server 10 SuSE SUSE Linux Enterprise SDK 10 SuSE SUSE Linux Enterprise Desktop 10 SuSE Linux Professional 10.2 x86_64 SuSE Linux Personal 10.2 x86_64 SGI ProPack 3.0 SP6 S.u.S.E. UnitedLinux 1.0 S.u.S.E. SuSE Linux Standard Server 8.0 S.u.S.E. SuSE Linux School Server for i386 S.u.S.E. SUSE LINUX Retail Solution 8.0 S.u.S.E. SuSE Linux Openexchange Server 4.0 S.u.S.E. openSUSE 10.2 S.u.S.E. Open-Enterprise-Server 0 S.u.S.E. Novell Linux POS 9 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 10.2 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 10.2 S.u.S.E. Linux Personal 10.1 S.u.S.E. Linux Openexchange Server S.u.S.E. Linux 9.3 x86-64 S.u.S.E. Linux 9.3 x86 S.u.S.E. Linux 10.1 x86-64 S.u.S.E. Linux 10.1 x86 S.u.S.E. Linux 10.1 ppc S.u.S.E. Linux 10.0 x86-64 S.u.S.E. Linux 10.0 x86 S.u.S.E. Linux 10.0 ppc rPath rPath Linux 1 RedHat Stronghold for Enterprise Linux 0 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 IA64 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 IA64 RedHat Enterprise Linux ES 2.1 RedHat Desktop 4.0 RedHat Desktop 3.0 RedHat Advanced Workstation for the Itanium Processor 2.1 IA64 RedHat Advanced Workstation for the Itanium Processor 2.1 Red Hat Enterprise Linux AS 4 Red Hat Enterprise Linux AS 3 Red Hat Enterprise Linux AS 2.1 IA64 Red Hat Enterprise Linux AS 2.1 PHP PHP 4.4.5 PHP PHP 4.4.4 PHP PHP 4.4.3 PHP PHP 4.4.2 PHP PHP 4.4.1 PHP PHP 4.4 .0 PHP PHP 4.3.11 PHP PHP 4.3.10 PHP PHP 4.3.9 PHP PHP 4.3.8 PHP PHP 4.3.7 PHP PHP 4.3.6 PHP PHP 4.3.5 PHP PHP 4.3.4 PHP PHP 4.3.3 PHP PHP 4.3.2 PHP PHP 4.3.1 PHP PHP 4.3 PHP PHP 4.2.3 PHP PHP 4.2.2 PHP PHP 4.2.1 PHP PHP 4.2 .0 PHP PHP 4.2 -dev PHP PHP 4.1.2 PHP PHP 4.1.1 PHP PHP 4.1 .0 PHP PHP 4.0.7 RC3 PHP PHP 4.0.7 RC2 PHP PHP 4.0.7 RC1 PHP PHP 4.0.7 PHP PHP 4.0.6 PHP PHP 4.0.5 PHP PHP 4.0.4 PHP PHP 4.0.3 pl1 PHP PHP 4.0.3 PHP PHP 4.0.2 PHP PHP 4.0.1 pl2 PHP PHP 4.0.1 pl1 PHP PHP 4.0.1 PHP PHP 4.0 0 MandrakeSoft Multi Network Firewall 2.0 MandrakeSoft Corporate Server 4.0 x86_64 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 MandrakeSoft Corporate Server 4.0 HP Tru64 UNIX Compaq Secure Web Server 6.3.2 a HP Tru64 UNIX Compaq Secure Web Server 6.3 HP Tru64 UNIX Compaq Secure Web Server 5.9.2 HP Tru64 UNIX Compaq Secure Web Server 5.9.1 HP Tru64 UNIX Compaq Secure Web Server 5.8.2 HP Tru64 UNIX Compaq Secure Web Server 5.8.1 HP Tru64 UNIX Compaq Secure Web Server 5.1 A HP Tru64 UNIX Compaq Secure Web Server 5.1 HP Tru64 UNIX Compaq Secure Web Server 5.0 A HP Tru64 UNIX Compaq Secure Web Server 4.0 G HP Tru64 UNIX Compaq Secure Web Server 4.0 F HP Systems Management HomePage 2.1.7.168 HP System Management Homepage 2.1.5 HP System Management Homepage 2.1.4 HP System Management Homepage 2.1.3 .132 HP System Management Homepage 2.1.3 HP System Management Homepage 2.1.2 HP System Management Homepage 2.1.1 HP System Management Homepage 2.1 HP System Management Homepage 2.0.2 HP System Management Homepage 2.0.1 HP System Management Homepage 2.0 HP Secure Web Server for HP Tru64 UNIX 6.6.4 HP Internet Express 6.0 HP Internet Express 5.9 HP Internet Express 5.8 HP Internet Express 5.7 HP Internet Express 5.4 HP Internet Express 6.6 HP Internet Express 6.4 HP Internet Express 6.3 Gentoo Linux Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 m68k Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 |
| Not Vulnerable: |
HP Systems Management HomePage 2.1.8 HP Internet Express 6.7 |
Discussion
PHP ZVAL Reference Counter Integer Overflow Vulnerability
PHP is prone to an integer-overflow vulnerability because it fails to ensure that integer values are not overrun.
A local attacker can exploit this vulnerability to execute arbitrary PHP scripts within the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions.
Note: According to 'MOPB-04-2007:PHP 4 unserialize() ZVAL Reference Counter Overflow', this issue may be remotely triggered in PHP 4.4.4 environments because many legacy PHP applications still use 'unserialize()' on user-supplied data. 'Unserialize()' uses the '__wakeup()' method of deserialized objects in an unsafe manner that may lead to remote arbitrary code execution. This BID has been changed to reflect the possibility of remote exploitation in PHP 4.4.4 environments.
PHP is prone to an integer-overflow vulnerability because it fails to ensure that integer values are not overrun.
A local attacker can exploit this vulnerability to execute arbitrary PHP scripts within the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions.
Note: According to 'MOPB-04-2007:PHP 4 unserialize() ZVAL Reference Counter Overflow', this issue may be remotely triggered in PHP 4.4.4 environments because many legacy PHP applications still use 'unserialize()' on user-supplied data. 'Unserialize()' uses the '__wakeup()' method of deserialized objects in an unsafe manner that may lead to remote arbitrary code execution. This BID has been changed to reflect the possibility of remote exploitation in PHP 4.4.4 environments.
Exploit / POC
PHP ZVAL Reference Counter Integer Overflow Vulnerability
The following proofs of concept are available:
The following proofs of concept are available:
Solution / Fix
PHP ZVAL Reference Counter Integer Overflow Vulnerability
Solution:
Please see the referenced advisories for information on obtaining and applying the appropriate updates.
HP Systems Management HomePage 2.1.7.168
PHP PHP 4.4.4
Solution:
Please see the referenced advisories for information on obtaining and applying the appropriate updates.
HP Systems Management HomePage 2.1.7.168
-
HP HP System Management Homepage for Linux
http://h18023.www1.hp.com/support/files/server/us/download/26864.html -
HP HP System Management Homepage for Linux (AMD64/EM64T)
http://h18023.www1.hp.com/support/files/server/us/download/26866.html -
HP HP System Management Homepage for Windows
http://h18023.www1.hp.com/support/files/server/us/download/26977.html
PHP PHP 4.4.4
-
Debian libapache-mod-php4_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4 _4.4.4-8+etch2_sparc.deb -
Debian libapache2-mod-php4_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php 4_4.4.4-8+etch2_sparc.deb -
Debian php4-cgi_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+e tch2_s390.deb -
Debian php4-cgi_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+e tch2_sparc.deb -
Debian php4-cli_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+e tch2_s390.deb -
Debian php4-cli_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+e tch2_sparc.deb -
Debian php4-common_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4- 8+etch2_s390.deb -
Debian php4-common_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4- 8+etch2_sparc.deb -
Debian php4-curl_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+ etch2_s390.deb -
Debian php4-curl_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+ etch2_sparc.deb -
Debian php4-dev_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+e tch2_s390.deb -
Debian php4-dev_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+e tch2_sparc.deb -
Debian php4-domxml_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4- 8+etch2_s390.deb -
Debian php4-domxml_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4- 8+etch2_sparc.deb -
Debian php4-gd_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+et ch2_s390.deb -
Debian php4-gd_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+et ch2_sparc.deb -
Debian php4-imap_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+ etch2_s390.deb -
Debian php4-imap_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+ etch2_sparc.deb -
Debian php4-ldap_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+ etch2_s390.deb -
Debian php4-ldap_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+ etch2_sparc.deb -
Debian php4-mcal_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+ etch2_s390.deb -
Debian php4-mcal_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+ etch2_sparc.deb -
Debian php4-mcrypt_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4- 8+etch2_s390.deb -
Debian php4-mcrypt_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4- 8+etch2_sparc.deb -
Debian php4-mhash_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8 +etch2_s390.deb -
Debian php4-mhash_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8 +etch2_sparc.deb -
Debian php4-mysql_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8 +etch2_s390.deb -
Debian php4-mysql_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8 +etch2_sparc.deb -
Debian php4-odbc_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+ etch2_s390.deb -
Debian php4-odbc_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+ etch2_sparc.deb -
Debian php4-pgsql_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8 +etch2_s390.deb -
Debian php4-pgsql_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8 +etch2_sparc.deb -
Debian php4-pspell_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4- 8+etch2_s390.deb -
Debian php4-pspell_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4- 8+etch2_sparc.deb -
Debian php4-recode_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4- 8+etch2_s390.deb -
Debian php4-recode_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4- 8+etch2_sparc.deb -
Debian php4-snmp_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+ etch2_s390.deb -
Debian php4-snmp_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+ etch2_sparc.deb -
Debian php4-sybase_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4- 8+etch2_s390.deb -
Debian php4-sybase_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4- 8+etch2_sparc.deb -
Debian php4-xslt_4.4.4-8+etch2_s390.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+ etch2_s390.deb -
Debian php4-xslt_4.4.4-8+etch2_sparc.deb
Debian GNU/Linux 4.0 alias etch
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+ etch2_sparc.deb -
Mandriva php4-cgi-4.4.4-1.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-cli-4.4.4-1.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-devel-4.4.4-1.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-gd-4.4.4-1.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-gd-4.4.4-1.1.20060mlcs4.x86_64.rpm
Corporate 4.0/X86_64:
http://www.mandriva.com/en/download -
Mandriva php4-mbstring-4.4.4-1.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-mbstring-4.4.4-1.1.20060mlcs4.x86_64.rpm
Corporate 4.0/X86_64:
http://www.mandriva.com/en/download -
Mandriva php4-sqlite-1.0.3-5.1.20060mlcs4.i586.rpm
Corporate 4.0:
http://www.mandriva.com/en/download -
Mandriva php4-sqlite-1.0.3-5.1.20060mlcs4.x86_64.rpm
Corporate 4.0/X86_64:
http://www.mandriva.com/en/download
References
PHP ZVAL Reference Counter Integer Overflow Vulnerability
References:
References:
- HPSBMA02215 SSRT071423 (HP)
- MOPB-01-2007:PHP 4 Userland ZVAL Reference Counter Overflow Vulnerability (Stefan Esser)
- MOPB-04-2007:PHP 4 unserialize() ZVAL Reference Counter Overflow (Stefan Esser)
- PHP 4 - Reference Counter Overflow Fix (Stefan Esser)
- PHP Homepage (PHP)
- RHSA-2007:0154-4 php security update (Red Hat)
- RHSA-2007:0155-2 php security update (Red Hat)
- RHSA-2007:0163-3 - php security update for Stronghold (Red Hat)
- SUSE Security Announcement: php4,php5 security problems (SUSE-SA:2007:032) (SUSE)