Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2007-04-06 01:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-1887
Mitre link : CVE-2007-1887
CVE.ORG link : CVE-2007-1887
JSON object : View
Products Affected
canonical
- ubuntu_linux
php
- php
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')