9.3
CVSSv2

CVE-2006-3017

Published: 14/06/2006 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

zend_hash_del_key_or_index in zend_hash.c in PHP prior to 4.4.3 and 5.x prior to 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 3.0.13

php php 3.0.14

php php 3.0.5

php php 3.0.6

php php 4.0.1

php php 4.0.6

php php 4.0.7

php php 4.0

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 5.0.0

php php 5.0.1

php php 5.0.2

php php 5.1.0

php php 3.0

php php 3.0.15

php php 3.0.16

php php 3.0.7

php php 3.0.8

php php 4.0.2

php php 4.0.3

php php 4.1.0

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 4.3.7

php php 5.0.3

php php 5.0.4

php php 5.1.1

php php 5.1.2

php php pl1

php php 3.0.1

php php 3.0.10

php php 3.0.17

php php 3.0.18

php php 3.0.9

php php 4.0.4

php php 4.1.1

php php 4.1.2

php php 4.3.1

php php 4.3.10

php php 4.3.8

php php 4.3.9

php php 5.0.5

php php 5.0

php php

php php 3.0.11

php php 3.0.12

php php 3.0.2

php php 3.0.3

php php 3.0.4

php php 4.0.0

php php 4.0.5

php php 4.2.0

php php 4.2.1

php php 4.3.11

php php 4.3.2

php php 4.4.0

php php 4.4.1

Vendor Advisories

Debian Bug report logs - #382259 PHP 443 and 444 fix security bugs (CVE-2006-301[67], et al) Package: php4; Maintainer for php4 is (unknown); Reported by: Stefan Fritsch <sf@sfritschde> Date: Wed, 9 Aug 2006 20:03:02 UTC Severity: grave Tags: fixed, fixed-upstream, security, upstream Done: Ondřej Surý <ondrej ...
The phpinfo() PHP function did not properly sanitize long strings A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo() Please note that it is not recommended to publicly expose phpinfo() (CVE-2006-0996) ...
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-3353 Tim Starling discovered that missing input sanitising in the EXIF module could lead ...

References

NVD-CWE-Otherhttp://www.php.net/release_5_1_3.phphttp://www.osvdb.org/25255http://secunia.com/advisories/19927http://securitytracker.com/id?1016306http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&r1=1.87.4.8.2.1&r2=1.87.4.8.2.2http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&view=loghttp://www.novell.com/linux/security/advisories/2006_31_php.htmlhttp://www.novell.com/linux/security/advisories/2006_34_php4.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0568.htmlhttp://secunia.com/advisories/21050http://secunia.com/advisories/21031http://www.redhat.com/support/errata/RHSA-2006-0567.htmlftp://patches.sgi.com/support/free/security/advisories/20060701-01-Uhttp://secunia.com/advisories/21135http://secunia.com/advisories/21202http://secunia.com/advisories/21252http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.htmlhttp://securitytracker.com/id?1016649http://rhn.redhat.com/errata/RHSA-2006-0549.htmlhttp://www.securityfocus.com/bid/17843http://support.avaya.com/elmodocs2/security/ASA-2006-175.htmhttp://secunia.com/advisories/21723https://issues.rpath.com/browse/RPL-683http://secunia.com/advisories/22225http://www.debian.org/security/2006/dsa-1206http://secunia.com/advisories/22713http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0166.htmlhttp://www.turbolinux.com/security/2006/TLSA-2006-38.txthttp://www.osvdb.org/26466http://secunia.com/advisories/21125http://www.mandriva.com/security/advisories?name=MDKSA-2006:122https://exchange.xforce.ibmcloud.com/vulnerabilities/27396https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10118https://usn.ubuntu.com/320-1/http://www.securityfocus.com/archive/1/447866/100/0/threadedhttp://www.securityfocus.com/archive/1/442437/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382259https://usn.ubuntu.com/320-1/https://nvd.nist.gov