CVE-2006-4020

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

References

ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc

http://bugs.php.net/bug.php?id=38322

http://rhn.redhat.com/errata/RHSA-2006-0688.html

http://rhn.redhat.com/errata/RHSA-2006-0736.html

http://secunia.com/advisories/21403

http://secunia.com/advisories/21467

http://secunia.com/advisories/21546

http://secunia.com/advisories/21608

http://secunia.com/advisories/21683

http://secunia.com/advisories/21768

http://secunia.com/advisories/21847

http://secunia.com/advisories/22004

http://secunia.com/advisories/22039

http://secunia.com/advisories/22069

http://secunia.com/advisories/22440

http://secunia.com/advisories/22487

http://secunia.com/advisories/22538

http://secunia.com/advisories/23247

http://security.gentoo.org/glsa/glsa-200608-28.xml

http://securityreason.com/securityalert/1341

http://securitytracker.com/id?1016984

http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm

http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm

http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm

http://www.mandriva.com/security/advisories?name=MDKSA-2006:144

http://www.novell.com/linux/security/advisories/2006_19_sr.html

http://www.novell.com/linux/security/advisories/2006_20_sr.html

http://www.novell.com/linux/security/advisories/2006_22_sr.html

http://www.novell.com/linux/security/advisories/2006_52_php.html

http://www.php.net/ChangeLog-5.php#5.1.5

http://www.php.net/release_5_1_5.php

http://www.plain-text.info/sscanf_bug.txt

http://www.redhat.com/support/errata/RHSA-2006-0669.html

http://www.redhat.com/support/errata/RHSA-2006-0682.html

http://www.securityfocus.com/archive/1/442438/30/0/threaded

http://www.securityfocus.com/bid/19415

http://www.ubuntu.com/usn/usn-342-1

http://www.vupen.com/english/advisories/2006/3193

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11062

Details

Source: MITRE

Published: 2006-08-08

Updated: 2018-10-30

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*

cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
67421Oracle Linux 4 : php (ELSA-2006-0730 / ELSA-2006-0669)NessusOracle Linux Local Security Checks
high
17713PHP 5.1.x < 5.1.5 Multiple VulnerabilitiesNessusCGI abuses
critical
17710PHP < 4.4.4 Multiple VulnerabilitiesNessusCGI abuses
high
29374SuSE 10 Security Update : PHP5 (ZYPP Patch Number 2102)NessusSuSE Local Security Checks
medium
27921Ubuntu 5.04 / 5.10 / 6.06 LTS : php4, php5 vulnerabilities (USN-342-1)NessusUbuntu Local Security Checks
high
27146openSUSE 10 Security Update : apache2-mod_php5 (apache2-mod_php5-2039)NessusSuSE Local Security Checks
medium
23893Mandrake Linux Security Advisory : php (MDKSA-2006:144)NessusMandriva Local Security Checks
medium
22444RHEL 2.1 : php (RHSA-2006:0682)NessusRed Hat Local Security Checks
high
22443RHEL 3 / 4 : php (RHSA-2006:0669)NessusRed Hat Local Security Checks
high
22423CentOS 3 / 4 : php (CESA-2006:0669)NessusCentOS Local Security Checks
high
22290GLSA-200608-28 : PHP: Arbitary code executionNessusGentoo Local Security Checks
medium