Vulnerability Name:

CVE-2006-4482 (CCN-30480)

Assigned:2006-08-17
Published:2006-08-17
Updated:2022-07-19
Summary:Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: Broken Link
20061001-01-P

Source: MITRE
Type: CNA
CVE-2006-4482

Source: MISC
Type: Broken Link, Patch
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11

Source: CCN
Type: RHSA-2006-0669
php security update

Source: CCN
Type: RHSA-2006-0682
php security update

Source: CCN
Type: RHSA-2006-0688
php security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2006:0688

Source: CCN
Type: SA21546
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: Not Applicable, Patch, Vendor Advisory
21546

Source: SECUNIA
Type: Not Applicable, Vendor Advisory
21768

Source: SECUNIA
Type: Not Applicable, Vendor Advisory
22004

Source: SECUNIA
Type: Not Applicable
22039

Source: SECUNIA
Type: Not Applicable, Vendor Advisory
22069

Source: SECUNIA
Type: Not Applicable, Vendor Advisory
22225

Source: CCN
Type: SA22440
Avaya Products PHP Multiple Vulnerabilities

Source: SECUNIA
Type: Not Applicable, Vendor Advisory
22440

Source: SECUNIA
Type: Not Applicable
22487

Source: CCN
Type: SA22538
Avaya Products PHP Multiple Vulnerabilites

Source: SECUNIA
Type: Not Applicable
22538

Source: SECUNIA
Type: Not Applicable
22713

Source: CCN
Type: SECTRACK ID: 1016984
PHP Heap Overflows and Other Bugs Let Users Execute Arbitrary Code or Cause Denial of Service Conditions

Source: SECTRACK
Type: Broken Link, Third Party Advisory, VDB Entry
1016984

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm

Source: CCN
Type: ASA-2006-221
php security update (RHSA-2006-0682)

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm

Source: CCN
Type: ASA-2006-222
php security update (RHSA-2006-0669)

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm

Source: CCN
Type: ASA-2006-223
php security update (RHSA-2006-0688)

Source: CCN
Type: PHP Web site
PHP: PHP 5.1.5 Release Announcement

Source: DEBIAN
Type: Third Party Advisory
DSA-1206

Source: DEBIAN
Type: DSA-1206
php4 -- several vulnerabilities

Source: SUSE
Type: Broken Link
SUSE-SA:2006:052

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://www.php.net/ChangeLog-5.php#5.1.5

Source: CONFIRM
Type: Patch, Release Notes, Vendor Advisory
http://www.php.net/release_5_1_5.php

Source: REDHAT
Type: Third Party Advisory
RHSA-2006:0669

Source: REDHAT
Type: Third Party Advisory
RHSA-2006:0682

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20061005 rPSA-2006-0182-1 php php-mysql php-pgsql

Source: BID
Type: Third Party Advisory, VDB Entry
19582

Source: CCN
Type: BID-19582
PHP Multiple Input Validation Vulnerabilities

Source: CCN
Type: TLSA-2006-38
Multiple vulnerabilities in php

Source: TURBO
Type: Broken Link
TLSA-2006-38

Source: CCN
Type: USN-342-1
PHP vulnerabilities

Source: UBUNTU
Type: Third Party Advisory
USN-342-1

Source: VUPEN
Type: Permissions Required
ADV-2006-3318

Source: XF
Type: UNKNOWN
php-strrepeat-bo(30480)

Source: CONFIRM
Type: Broken Link
https://issues.rpath.com/browse/RPL-683

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:10121

Source: SUSE
Type: SUSE-SA:2006:052
php4php5 security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:*:*:*:*:*:*:*:* (Version < 5.1.5)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10121
    V
    Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
    2013-04-29
    oval:org.debian:def:1206
    V
    several vulnerabilities
    2006-11-06
    oval:com.redhat.rhsa:def:20060669
    P
    RHSA-2006:0669: php security update (Moderate)
    2006-09-21
    BACK
    php php *
    canonical ubuntu linux 5.04
    canonical ubuntu linux 5.10
    canonical ubuntu linux 6.06
    debian debian linux 3.1
    php php 5.0.3
    php php 5.0.4
    php php 5.0.0
    php php 5.0.5
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.0.2
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.1.0
    php php 5.1.3
    suse linux enterprise server 8
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    suse suse linux school server -
    redhat enterprise linux 3
    suse suse linux 9.2
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    novell open enterprise server *
    mandrakesoft mandrake multi network firewall 2.0
    suse suse linux 10.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    canonical ubuntu 6.06
    suse suse linux 10.1
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    novell open enterprise server *
    suse suse linux 9.3