5
CVSSv2

CVE-2006-1990

Published: 24/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent malicious users to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.4.2

php php 5.1.2

Vendor Advisories

The phpinfo() PHP function did not properly sanitize long strings A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo() Please note that it is not recommended to publicly expose phpinfo() (CVE-2006-0996) ...
Debian Bug report logs - #365311 CVE-2006-1990/CVE-2006-1991: Security vulnerabilities in php Package: php4; Maintainer for php4 is (unknown); Reported by: Stefan Fritsch <sf@sfritschde> Date: Sat, 29 Apr 2006 06:48:02 UTC Severity: grave Tags: security Found in version php4/4:442-1 Fixed in version php4/4:442-11 D ...
Debian Bug report logs - #365312 CVE-2006-1990/CVE-2006-1991: Security vulnerabilities in php Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sat, 29 Apr 2006 06:4 ...

References

NVD-CWE-Otherhttp://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02http://securitytracker.com/id?1015979http://secunia.com/advisories/19803http://www.redhat.com/support/errata/RHSA-2006-0501.htmlhttp://secunia.com/advisories/20222http://secunia.com/advisories/20269http://www.novell.com/linux/security/advisories/2006_31_php.htmlhttp://security.gentoo.org/glsa/glsa-200605-08.xmlhttp://www.redhat.com/support/errata/RHSA-2006-0568.htmlhttp://www.ubuntu.com/usn/usn-320-1http://secunia.com/advisories/21050http://secunia.com/advisories/21031ftp://patches.sgi.com/support/free/security/advisories/20060701-01-Uhttp://secunia.com/advisories/21135http://secunia.com/advisories/21252http://support.avaya.com/elmodocs2/security/ASA-2006-160.htmhttp://secunia.com/advisories/21564http://rhn.redhat.com/errata/RHSA-2006-0549.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-175.htmhttp://secunia.com/advisories/21723https://issues.rpath.com/browse/RPL-683http://secunia.com/advisories/22225http://docs.info.apple.com/article.html?artnum=304829http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23155http://www.turbolinux.com/security/2006/TLSA-2006-38.txthttp://secunia.com/advisories/20052http://secunia.com/advisories/20676http://secunia.com/advisories/21125http://www.mandriva.com/security/advisories?name=MDKSA-2006:122http://www.vupen.com/english/advisories/2006/1500http://www.vupen.com/english/advisories/2006/4750http://www.mandriva.com/security/advisories?name=MDKSA-2006:091https://exchange.xforce.ibmcloud.com/vulnerabilities/26001https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696http://www.securityfocus.com/archive/1/447866/100/0/threadedhttps://usn.ubuntu.com/320-1/https://nvd.nist.gov