The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
Advisories
Source ID Title
EUVD EUVD EUVD-2007-1377 The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T12:50:35.018Z

Reserved: 2007-03-09T00:00:00

Link: CVE-2007-1381

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-03-10T00:19:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-1381

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.