Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-1285
The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.115
EPSS Ranking
93.2%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://rhn.redhat.com/errata/RHSA-2007-0154.html
http://rhn.redhat.com/errata/RHSA-2007-0155.html
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24909
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25445
http://secunia.com/advisories/26048
http://secunia.com/advisories/26642
http://secunia.com/advisories/27864
http://secunia.com/advisories/28936
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
http://us2.php.net/releases/4_4_7.php
http://us2.php.net/releases/5_2_2.php
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
http://www.osvdb.org/32769
http://www.php-security.org/MOPB/MOPB-03-2007.html
http://www.php.net/ChangeLog-4.php
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_4.php
http://www.redhat.com/support/errata/RHSA-2007-0082.html
http://www.redhat.com/support/errata/RHSA-2007-0162.html
http://www.securityfocus.com/archive/1/466166/100/0/threaded
http://www.securityfocus.com/bid/22764
http://www.securitytracker.com/id?1017771
http://www.ubuntu.com/usn/usn-549-2
https://issues.rpath.com/browse/RPL-1268
https://launchpad.net/bugs/173043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017
https://usn.ubuntu.com/549-1/
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://rhn.redhat.com/errata/RHSA-2007-0154.html
http://rhn.redhat.com/errata/RHSA-2007-0155.html
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24909
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25445
http://secunia.com/advisories/26048
http://secunia.com/advisories/26642
http://secunia.com/advisories/27864
http://secunia.com/advisories/28936
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
http://us2.php.net/releases/4_4_7.php
http://us2.php.net/releases/5_2_2.php
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
http://www.osvdb.org/32769
http://www.php-security.org/MOPB/MOPB-03-2007.html
http://www.php.net/ChangeLog-4.php
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_4.php
http://www.redhat.com/support/errata/RHSA-2007-0082.html
http://www.redhat.com/support/errata/RHSA-2007-0162.html
http://www.securityfocus.com/archive/1/466166/100/0/threaded
http://www.securityfocus.com/bid/22764
http://www.securitytracker.com/id?1017771
http://www.ubuntu.com/usn/usn-549-2
https://issues.rpath.com/browse/RPL-1268
https://launchpad.net/bugs/173043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017
https://usn.ubuntu.com/549-1/
Products affected by CVE-2007-1285
Php
»
Php
»
Version:
4.0.0
cpe:2.3:a:php:php:4.0.0
Php
»
Php
»
Version:
4.0.1
cpe:2.3:a:php:php:4.0.1
Php
»
Php
»
Version:
4.0.2
cpe:2.3:a:php:php:4.0.2
Php
»
Php
»
Version:
4.0.3
cpe:2.3:a:php:php:4.0.3
Php
»
Php
»
Version:
4.0.4
cpe:2.3:a:php:php:4.0.4
Php
»
Php
»
Version:
4.0.5
cpe:2.3:a:php:php:4.0.5
Php
»
Php
»
Version:
4.0.6
cpe:2.3:a:php:php:4.0.6
Php
»
Php
»
Version:
4.0.7
cpe:2.3:a:php:php:4.0.7
Php
»
Php
»
Version:
4.1.0
cpe:2.3:a:php:php:4.1.0
Php
»
Php
»
Version:
4.1.1
cpe:2.3:a:php:php:4.1.1
Php
»
Php
»
Version:
4.1.2
cpe:2.3:a:php:php:4.1.2
Php
»
Php
»
Version:
4.1.3
cpe:2.3:a:php:php:4.1.3
Php
»
Php
»
Version:
4.2
cpe:2.3:a:php:php:4.2
Php
»
Php
»
Version:
4.2.0
cpe:2.3:a:php:php:4.2.0
Php
»
Php
»
Version:
4.2.1
cpe:2.3:a:php:php:4.2.1
Php
»
Php
»
Version:
4.2.2
cpe:2.3:a:php:php:4.2.2
Php
»
Php
»
Version:
4.2.3
cpe:2.3:a:php:php:4.2.3
Php
»
Php
»
Version:
4.2.4
cpe:2.3:a:php:php:4.2.4
Php
»
Php
»
Version:
4.3
cpe:2.3:a:php:php:4.3
Php
»
Php
»
Version:
4.3.0
cpe:2.3:a:php:php:4.3.0
Php
»
Php
»
Version:
4.3.1
cpe:2.3:a:php:php:4.3.1
Php
»
Php
»
Version:
4.3.10
cpe:2.3:a:php:php:4.3.10
Php
»
Php
»
Version:
4.3.11
cpe:2.3:a:php:php:4.3.11
Php
»
Php
»
Version:
4.3.2
cpe:2.3:a:php:php:4.3.2
Php
»
Php
»
Version:
4.3.3
cpe:2.3:a:php:php:4.3.3
Php
»
Php
»
Version:
4.3.4
cpe:2.3:a:php:php:4.3.4
Php
»
Php
»
Version:
4.3.5
cpe:2.3:a:php:php:4.3.5
Php
»
Php
»
Version:
4.3.6
cpe:2.3:a:php:php:4.3.6
Php
»
Php
»
Version:
4.3.7
cpe:2.3:a:php:php:4.3.7
Php
»
Php
»
Version:
4.3.8
cpe:2.3:a:php:php:4.3.8
Php
»
Php
»
Version:
4.3.9
cpe:2.3:a:php:php:4.3.9
Php
»
Php
»
Version:
4.4.0
cpe:2.3:a:php:php:4.4.0
Php
»
Php
»
Version:
4.4.1
cpe:2.3:a:php:php:4.4.1
Php
»
Php
»
Version:
4.4.2
cpe:2.3:a:php:php:4.4.2
Php
»
Php
»
Version:
4.4.3
cpe:2.3:a:php:php:4.4.3
Php
»
Php
»
Version:
4.4.4
cpe:2.3:a:php:php:4.4.4
Php
»
Php
»
Version:
4.4.5
cpe:2.3:a:php:php:4.4.5
Php
»
Php
»
Version:
4.4.6
cpe:2.3:a:php:php:4.4.6
Php
»
Php
»
Version:
5.0.0
cpe:2.3:a:php:php:5.0.0
Php
»
Php
»
Version:
5.0.1
cpe:2.3:a:php:php:5.0.1
Php
»
Php
»
Version:
5.0.2
cpe:2.3:a:php:php:5.0.2
Php
»
Php
»
Version:
5.0.3
cpe:2.3:a:php:php:5.0.3
Php
»
Php
»
Version:
5.0.4
cpe:2.3:a:php:php:5.0.4
Php
»
Php
»
Version:
5.0.5
cpe:2.3:a:php:php:5.0.5
Php
»
Php
»
Version:
5.1
cpe:2.3:a:php:php:5.1
Php
»
Php
»
Version:
5.1.0
cpe:2.3:a:php:php:5.1.0
Php
»
Php
»
Version:
5.1.1
cpe:2.3:a:php:php:5.1.1
Php
»
Php
»
Version:
5.1.2
cpe:2.3:a:php:php:5.1.2
Php
»
Php
»
Version:
5.1.3
cpe:2.3:a:php:php:5.1.3
Php
»
Php
»
Version:
5.1.4
cpe:2.3:a:php:php:5.1.4
Php
»
Php
»
Version:
5.1.5
cpe:2.3:a:php:php:5.1.5
Php
»
Php
»
Version:
5.1.6
cpe:2.3:a:php:php:5.1.6
Php
»
Php
»
Version:
5.2.0
cpe:2.3:a:php:php:5.2.0
Php
»
Php
»
Version:
5.2.1
cpe:2.3:a:php:php:5.2.1
Canonical
»
Ubuntu Linux
»
Version:
7.10
cpe:2.3:o:canonical:ubuntu_linux:7.10
Novell
»
Suse Linux
»
Version:
10.0
cpe:2.3:o:novell:suse_linux:10.0
Novell
»
Suse Linux
»
Version:
10.1
cpe:2.3:o:novell:suse_linux:10.1
Redhat
»
Enterprise Linux Desktop
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
Redhat
»
Enterprise Linux Desktop
»
Version:
4.0
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0
Redhat
»
Enterprise Linux Server
»
Version:
2.0
cpe:2.3:o:redhat:enterprise_linux_server:2.0
Redhat
»
Enterprise Linux Server
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_server:3.0
Redhat
»
Enterprise Linux Server
»
Version:
4.0
cpe:2.3:o:redhat:enterprise_linux_server:4.0
Redhat
»
Enterprise Linux Workstation
»
Version:
2.0
cpe:2.3:o:redhat:enterprise_linux_workstation:2.0
Redhat
»
Enterprise Linux Workstation
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0
Redhat
»
Enterprise Linux Workstation
»
Version:
4.0
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0
Suse
»
Linux Enterprise Server
»
Version:
10
cpe:2.3:o:suse:linux_enterprise_server:10
Suse
»
Linux Enterprise Server
»
Version:
8
cpe:2.3:o:suse:linux_enterprise_server:8
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved