PHP4 in Sarge may be vulnerable to CVE-2006-0208

Related Vulnerabilities: CVE-2006-0208  

Debian Bug report logs - #354682
PHP4 in Sarge may be vulnerable to CVE-2006-0208

version graph

Package: php4; Maintainer for php4 is (unknown);

Reported by: "Nick Jenkins" <nickpj@gmail.com>

Date: Tue, 28 Feb 2006 04:48:16 UTC

Severity: normal

Tags: security

Found in version php4/4:4.3.10-16

Fixed in version php4/4:4.4.1

Done: Steve Langasek <vorlon@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>:
Bug#354682; Package php4. (full text, mbox, link).


Acknowledgement sent to "Nick Jenkins" <nickpj@gmail.com>:
New Bug report received and forwarded. Copy sent to Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Nick Jenkins" <nickpj@gmail.com>
To: submit@bugs.debian.org
Subject: PHP4 in Sarge may be vulnerable to CVE-2006-0208
Date: Tue, 28 Feb 2006 15:28:35 +1100
Package: php4
Version: 4:4.3.10-16
Severity: normal
Tags: security

Ref:
  http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208

Description:
  Multiple cross-site scripting (XSS) vulnerabilities in PHP 5.1.1, when
 display_errors and html_errors are on, allow remote attackers to inject
  arbitrary web script or HTML via inputs to PHP applications that are
 not filtered when they are included in the resulting error message.

Vulnerable PHP versions
  CVE report lists 5.1.1, however PHP 4.3.x is also vulnerable
according to: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178028



Bug marked as fixed in version 4:4.4.1, send any further explanations to "Nick Jenkins" <nickpj@gmail.com> Request was from Steve Langasek <vorlon@debian.org> to control@bugs.debian.org. (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 26 Jun 2007 19:42:37 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:56:01 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.