Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://docs.info.apple.com/article.html?artnum=304829
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://secunia.com/advisories/19803
http://secunia.com/advisories/20052
http://secunia.com/advisories/20222
http://secunia.com/advisories/20269
http://secunia.com/advisories/20676
http://secunia.com/advisories/21031
http://secunia.com/advisories/21050
http://secunia.com/advisories/21125
http://secunia.com/advisories/21135
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
http://secunia.com/advisories/21723
http://secunia.com/advisories/22225
http://secunia.com/advisories/23155
http://security.gentoo.org/glsa/glsa-200605-08.xml
http://securitytracker.com/id?1015979
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02
http://www.mandriva.com/security/advisories?name=MDKSA-2006:091
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.novell.com/linux/security/advisories/2006_31_php.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
http://www.redhat.com/support/errata/RHSA-2006-0568.html
http://www.securityfocus.com/archive/1/447866/100/0/threaded
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.ubuntu.com/usn/usn-320-1
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
http://www.vupen.com/english/advisories/2006/1500
http://www.vupen.com/english/advisories/2006/4750
https://exchange.xforce.ibmcloud.com/vulnerabilities/26001
https://issues.rpath.com/browse/RPL-683
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696
Source: MITRE
Published: 2006-04-24
Updated: 2018-10-18
Type: NVD-CWE-Other
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
27897 | Ubuntu 5.04 / 5.10 / 6.06 LTS : php4, php5 vulnerabilities (USN-320-1) | Nessus | Ubuntu Local Security Checks | high |
27389 | openSUSE 10 Security Update : php5 (php5-1590) | Nessus | SuSE Local Security Checks | medium |
3509 | PHP 5.1.x < 5.1.4 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | medium |
22268 | PHP < 4.4.3 / 5.1.4 Multiple Vulnerabilities | Nessus | CGI abuses | high |
22053 | Mandrake Linux Security Advisory : php (MDKSA-2006:122) | Nessus | Mandriva Local Security Checks | critical |
22044 | RHEL 3 / 4 : php (RHSA-2006:0568) | Nessus | Red Hat Local Security Checks | high |
22037 | CentOS 3 / 4 : php (CESA-2006:0568) | Nessus | CentOS Local Security Checks | high |
21602 | Mandrake Linux Security Advisory : php (MDKSA-2006:091) | Nessus | Mandriva Local Security Checks | medium |
21594 | RHEL 2.1 : php (RHSA-2006:0501) | Nessus | Red Hat Local Security Checks | high |
21350 | GLSA-200605-08 : PHP: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | medium |
801115 | PHP < 5.1.4 Multiple Vulnerabilities | Log Correlation Engine | Web Servers | high |