~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2008-1384

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDate: 2008-03-27
2
 
Candidate: CVE-2008-1384
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384
5
 
 https://usn.ubuntu.com/usn/usn-628-1
6
 
Description:
7
 
 Integer overflow in PHP 5.2.5 and earlier allows context-dependent
8
 
 attackers to cause a denial of service and possibly have unspecified other
9
 
 impact via a printf format parameter with a large width specifier, related
10
 
 to the php_sprintf_appendstring function in formatted_print.c and probably
11
 
 other functions for formatted strings (aka *printf functions).
12
 
Ubuntu-Description:
13
 
Notes:
14
 
 jdstrand> per Debian, needs a malicious script
15
 
Bugs:
16
 
Priority: negligible
17
 
Discovered-by:
18
 
Assigned-to:
19
 
 
20
 
 
21
 
Patches_php5:
22
 
 vendor: http://www.debian.org/security/2008/dsa-1572
23
 
upstream_php5: released (5.2.6)
24
 
dapper_php5: released (5.1.2-1ubuntu3.12)
25
 
edgy_php5: needed
26
 
feisty_php5: released (5.2.1-0ubuntu1.6)
27
 
gutsy_php5: released (5.2.3-1ubuntu6.4)
28
 
hardy_php5: released (5.2.4-2ubuntu5.3)
29
 
devel_php5: not-affected (5.2.6-1ubuntu4)