CVE-2007-1285

7.5 HIGH
Published: March 06, 2007 Modified: April 23, 2026
View on NVD

Description

The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0154.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0155.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0163.html
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/24909
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/24910
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/24924
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/24941
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/24945
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/25445
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/26048
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/26642
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/27864
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/28936
Source: cve@mitre.org
Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xml
Source: cve@mitre.org
Third Party Advisory
http://us2.php.net/releases/4_4_7.php
Source: cve@mitre.org
Release Notes
http://us2.php.net/releases/5_2_2.php
Source: cve@mitre.org
Release Notes
http://www.osvdb.org/32769
Source: cve@mitre.org
Broken Link
http://www.php-security.org/MOPB/MOPB-03-2007.html
Source: cve@mitre.org
Broken Link Exploit Vendor Advisory
http://www.php.net/ChangeLog-4.php
Source: cve@mitre.org
Release Notes
http://www.php.net/ChangeLog-5.php#5.2.4
Source: cve@mitre.org
Release Notes
http://www.php.net/releases/4_4_8.php
Source: cve@mitre.org
Release Notes
http://www.php.net/releases/5_2_4.php
Source: cve@mitre.org
Release Notes
http://www.securityfocus.com/archive/1/466166/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/22764
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017771
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-549-2
Source: cve@mitre.org
Third Party Advisory
https://issues.rpath.com/browse/RPL-1268
Source: cve@mitre.org
Broken Link
https://launchpad.net/bugs/173043
Source: cve@mitre.org
Exploit Issue Tracking
https://usn.ubuntu.com/549-1/
Source: cve@mitre.org
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://rhn.redhat.com/errata/RHSA-2007-0154.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0155.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0163.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24909
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/24910
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/24924
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/24941
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/24945
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/25445
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/26048
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/26642
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/27864
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/28936
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://us2.php.net/releases/4_4_7.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://us2.php.net/releases/5_2_2.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/32769
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.php-security.org/MOPB/MOPB-03-2007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Vendor Advisory
http://www.php.net/ChangeLog-4.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.php.net/ChangeLog-5.php#5.2.4
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.php.net/releases/4_4_8.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.php.net/releases/5_2_4.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.redhat.com/support/errata/RHSA-2007-0082.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0162.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/466166/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/22764
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017771
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-549-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://issues.rpath.com/browse/RPL-1268
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://launchpad.net/bugs/173043
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking
https://usn.ubuntu.com/549-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

76 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

suse canonical php novell redhat