cpe:/a:php:php:5.2.5 CVE-2008-1384 2008-03-27T13:44:00.000-04:00 2017-08-07T21:30:07.697-04:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2008-03-28T11:26:00.000-04:00 SREASONRES 20080320 PHP 5.2.5 and prior : *printf() functions Integer Overflow BUGTRAQ 20080321 {securityreason.com}PHP 5 *printf() - Integer Overflow BUGTRAQ 20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl BUGTRAQ 20080527 rPSA-2008-0178-1 php php-mysql php-pgsql BID 28392 SECUNIA 30158 SECUNIA 30345 SECUNIA 30411 SECUNIA 30967 SECUNIA 31200 SECUNIA 32746 DEBIAN DSA-1572 GENTOO GLSA-200811-05 MANDRIVA MDVSA-2009:022 MANDRIVA MDVSA-2009:023 SUSE SUSE-SR:2008:014 UBUNTU USN-628-1 CONFIRM http://cvs.php.net/viewvc.cgi/php-src/NEWS?revision=1.2027.2.547.2.1120&view=markup CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176 CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 CONFIRM https://issues.rpath.com/browse/RPL-2503 XF php-phpsprintfappendstring-overflow(41386) Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).