Description
CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1282-1 | New php4 packages fix several vulnerabilities |
Debian DSA |
DSA-1283-1 | New php5 packages fix several vulnerabilities |
Ubuntu USN |
USN-455-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T13:06:26.069Z
Reserved: 2007-03-27T00:00:00.000Z
Link: CVE-2007-1718
No data.
Status : Modified
Published: 2007-03-28T00:19:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-1718
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN