Vulnerability Name: CVE-2006-4482 (CCN-30480) Assigned: 2006-08-17 Published: 2006-08-17 Updated: 2022-07-19 Summary: Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990 . CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: SGI Type: Broken Link20061001-01-P Source: MITRE Type: CNACVE-2006-4482 Source: MISC Type: Broken Link, Patchhttp://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11 Source: CCN Type: RHSA-2006-0669php security update Source: CCN Type: RHSA-2006-0682php security update Source: CCN Type: RHSA-2006-0688php security update Source: REDHAT Type: Third Party AdvisoryRHSA-2006:0688 Source: CCN Type: SA21546PHP Multiple Vulnerabilities Source: SECUNIA Type: Not Applicable, Patch, Vendor Advisory21546 Source: SECUNIA Type: Not Applicable, Vendor Advisory21768 Source: SECUNIA Type: Not Applicable, Vendor Advisory22004 Source: SECUNIA Type: Not Applicable22039 Source: SECUNIA Type: Not Applicable, Vendor Advisory22069 Source: SECUNIA Type: Not Applicable, Vendor Advisory22225 Source: CCN Type: SA22440Avaya Products PHP Multiple Vulnerabilities Source: SECUNIA Type: Not Applicable, Vendor Advisory22440 Source: SECUNIA Type: Not Applicable22487 Source: CCN Type: SA22538Avaya Products PHP Multiple Vulnerabilites Source: SECUNIA Type: Not Applicable22538 Source: SECUNIA Type: Not Applicable22713 Source: CCN Type: SECTRACK ID: 1016984PHP Heap Overflows and Other Bugs Let Users Execute Arbitrary Code or Cause Denial of Service Conditions Source: SECTRACK Type: Broken Link, Third Party Advisory, VDB Entry1016984 Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2006-221.htm Source: CCN Type: ASA-2006-221php security update (RHSA-2006-0682) Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2006-222.htm Source: CCN Type: ASA-2006-222php security update (RHSA-2006-0669) Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2006-223.htm Source: CCN Type: ASA-2006-223php security update (RHSA-2006-0688) Source: CCN Type: PHP Web sitePHP: PHP 5.1.5 Release Announcement Source: DEBIAN Type: Third Party AdvisoryDSA-1206 Source: DEBIAN Type: DSA-1206php4 -- several vulnerabilities Source: SUSE Type: Broken LinkSUSE-SA:2006:052 Source: CONFIRM Type: Release Notes, Vendor Advisoryhttp://www.php.net/ChangeLog-5.php#5.1.5 Source: CONFIRM Type: Patch, Release Notes, Vendor Advisoryhttp://www.php.net/release_5_1_5.php Source: REDHAT Type: Third Party AdvisoryRHSA-2006:0669 Source: REDHAT Type: Third Party AdvisoryRHSA-2006:0682 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20061005 rPSA-2006-0182-1 php php-mysql php-pgsql Source: BID Type: Third Party Advisory, VDB Entry19582 Source: CCN Type: BID-19582PHP Multiple Input Validation Vulnerabilities Source: CCN Type: TLSA-2006-38Multiple vulnerabilities in php Source: TURBO Type: Broken LinkTLSA-2006-38 Source: CCN Type: USN-342-1PHP vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-342-1 Source: VUPEN Type: Permissions RequiredADV-2006-3318 Source: XF Type: UNKNOWNphp-strrepeat-bo(30480) Source: CONFIRM Type: Broken Linkhttps://issues.rpath.com/browse/RPL-683 Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:10121 Source: SUSE Type: SUSE-SA:2006:052php4php5 security update Vulnerable Configuration: Configuration 1 :cpe:/a:php:php:*:*:*:*:*:*:*:* (Version < 5.1.5)Configuration 2 :cpe:/o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:php:php:5.0.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:* AND cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:10121 V Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990. 2013-04-29 oval:org.debian:def:1206 V several vulnerabilities 2006-11-06 oval:com.redhat.rhsa:def:20060669 P RHSA-2006:0669: php security update (Moderate) 2006-09-21
BACK
php php *
canonical ubuntu linux 5.04
canonical ubuntu linux 5.10
canonical ubuntu linux 6.06
debian debian linux 3.1
php php 5.0.3
php php 5.0.4
php php 5.0.0
php php 5.0.5
php php 5.1.1
php php 5.1.2
php php 5.1.4
php php 5.0.2
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 5.1.0
php php 5.1.3
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux school server -
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
novell open enterprise server *
suse suse linux 9.3