VYPR
Unrated severityNVD Advisory· Published Feb 13, 2007· Updated Apr 23, 2026

CVE-2007-0906

CVE-2007-0906

Description

Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).

Affected products

77
  • PHP/PHP75 versions
    cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*+ 74 more
    • cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
    • cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

54

News mentions

0

No linked articles in our index yet.