Vulnerability Name:

CVE-2006-4486 (CCN-30482)

Assigned:2006-08-18
Published:2006-08-18
Updated:2018-10-30
Summary:Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Other
References:Source: SGI
Type: UNKNOWN
20061001-01-P

Source: MITRE
Type: CNA
CVE-2006-4486

Source: CCN
Type: RHSA-2006-0669
php security update

Source: CCN
Type: RHSA-2006-0682
php security update

Source: CCN
Type: RHSA-2006-0688
php security update

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0688

Source: CCN
Type: SA21546
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
21546

Source: SECUNIA
Type: Vendor Advisory
22004

Source: SECUNIA
Type: Vendor Advisory
22069

Source: SECUNIA
Type: Vendor Advisory
22225

Source: SECUNIA
Type: Vendor Advisory
22331

Source: CCN
Type: SA22440
Avaya Products PHP Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22440

Source: SECUNIA
Type: Vendor Advisory
22487

Source: CCN
Type: SA22538
Avaya Products PHP Multiple Vulnerabilites

Source: SECUNIA
Type: Vendor Advisory
22538

Source: SECUNIA
Type: Vendor Advisory
25945

Source: CCN
Type: SECTRACK ID: 1016984
PHP Heap Overflows and Other Bugs Let Users Execute Arbitrary Code or Cause Denial of Service Conditions

Source: SECTRACK
Type: UNKNOWN
1016984

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm

Source: CCN
Type: ASA-2006-221
php security update (RHSA-2006-0682)

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm

Source: CCN
Type: ASA-2006-222
php security update (RHSA-2006-0669)

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm

Source: CCN
Type: ASA-2006-223
php security update (RHSA-2006-0688)

Source: CCN
Type: PHP Web site
PHP: PHP 5.1.6 Release Announcement

Source: DEBIAN
Type: UNKNOWN
DSA-1331

Source: DEBIAN
Type: DSA-1331
php4 -- several vulnerabilities

Source: MISC
Type: Patch
http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14

Source: SUSE
Type: UNKNOWN
SUSE-SA:2006:052

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php#5.1.6

Source: CONFIRM
Type: Patch
http://www.php.net/release_5_1_6.php

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0669

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0682

Source: BUGTRAQ
Type: UNKNOWN
20061005 rPSA-2006-0182-1 php php-mysql php-pgsql

Source: BID
Type: UNKNOWN
19582

Source: CCN
Type: BID-19582
PHP Multiple Input Validation Vulnerabilities

Source: CCN
Type: TLSA-2006-38
Multiple vulnerabilities in php

Source: TURBO
Type: UNKNOWN
TLSA-2006-38

Source: CCN
Type: USN-362-1
PHP vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-362-1

Source: XF
Type: UNKNOWN
php-unspecified-integer-overflow(30482)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-683

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11086

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:20488
    P
    DSA-1331-1 php4 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:11086
    V
    Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
    2013-04-29
    oval:org.debian:def:1331
    V
    several vulnerabilities
    2007-07-07
    oval:com.redhat.rhsa:def:20060669
    P
    RHSA-2006:0669: php security update (Moderate)
    2006-09-21
    BACK
    php php 5.1.0
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.1.5
    php php 5.0.3
    php php 5.0.4
    php php 5.0.0
    php php 5.0.5
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.0.2
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.1.0
    php php 5.1.3
    php php 5.1.5
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    debian debian linux 4.0