CVE-2006-1990

MEDIUM

Description

Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.

References

ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U

http://docs.info.apple.com/article.html?artnum=304829

http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html

http://rhn.redhat.com/errata/RHSA-2006-0549.html

http://secunia.com/advisories/19803

http://secunia.com/advisories/20052

http://secunia.com/advisories/20222

http://secunia.com/advisories/20269

http://secunia.com/advisories/20676

http://secunia.com/advisories/21031

http://secunia.com/advisories/21050

http://secunia.com/advisories/21125

http://secunia.com/advisories/21135

http://secunia.com/advisories/21252

http://secunia.com/advisories/21564

http://secunia.com/advisories/21723

http://secunia.com/advisories/22225

http://secunia.com/advisories/23155

http://security.gentoo.org/glsa/glsa-200605-08.xml

http://securitytracker.com/id?1015979

http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm

http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm

http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02

http://www.mandriva.com/security/advisories?name=MDKSA-2006:091

http://www.mandriva.com/security/advisories?name=MDKSA-2006:122

http://www.novell.com/linux/security/advisories/2006_31_php.html

http://www.redhat.com/support/errata/RHSA-2006-0501.html

http://www.redhat.com/support/errata/RHSA-2006-0568.html

http://www.securityfocus.com/archive/1/447866/100/0/threaded

http://www.turbolinux.com/security/2006/TLSA-2006-38.txt

http://www.ubuntu.com/usn/usn-320-1

http://www.us-cert.gov/cas/techalerts/TA06-333A.html

http://www.vupen.com/english/advisories/2006/1500

http://www.vupen.com/english/advisories/2006/4750

https://exchange.xforce.ibmcloud.com/vulnerabilities/26001

https://issues.rpath.com/browse/RPL-683

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696

Details

Source: MITRE

Published: 2006-04-24

Updated: 2018-10-18

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
27897Ubuntu 5.04 / 5.10 / 6.06 LTS : php4, php5 vulnerabilities (USN-320-1)NessusUbuntu Local Security Checks
high
27389openSUSE 10 Security Update : php5 (php5-1590)NessusSuSE Local Security Checks
medium
3509PHP 5.1.x < 5.1.4 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
22268PHP < 4.4.3 / 5.1.4 Multiple VulnerabilitiesNessusCGI abuses
high
22053Mandrake Linux Security Advisory : php (MDKSA-2006:122)NessusMandriva Local Security Checks
critical
22044RHEL 3 / 4 : php (RHSA-2006:0568)NessusRed Hat Local Security Checks
high
22037CentOS 3 / 4 : php (CESA-2006:0568)NessusCentOS Local Security Checks
high
21602Mandrake Linux Security Advisory : php (MDKSA-2006:091)NessusMandriva Local Security Checks
medium
21594RHEL 2.1 : php (RHSA-2006:0501)NessusRed Hat Local Security Checks
high
21350GLSA-200605-08 : PHP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
801115PHP < 5.1.4 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
high