CVE-2006-4482
 
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
MĂșltiples vulnerabilidades de desbordamiento de bĂșfer en las funciones (1) str_repeat y (2) wordwrap en ext/standard/string.c en PHP anterior a 5.1.5, cuando se uso sobre sistemas de 64-bit, tiene un impacto desconocido y ataque a vectores, una vulnerabilidad diferente que la CVE-2006-1990.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-08-31 CVE Reserved
- 2006-08-31 CVE Published
- 2023-08-12 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (31)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/22039 | Not Applicable | |
http://secunia.com/advisories/22487 | Not Applicable | |
http://secunia.com/advisories/22538 | Not Applicable | |
http://secunia.com/advisories/22713 | Not Applicable | |
http://securitytracker.com/id?1016984 | Broken Link | |
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm | Third Party Advisory | |
http://www.securityfocus.com/archive/1/447866/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/19582 | Third Party Advisory | |
https://issues.rpath.com/browse/RPL-683 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11 | 2022-07-19 | |
http://secunia.com/advisories/21546 | 2022-07-19 | |
http://www.php.net/release_5_1_5.php | 2022-07-19 |
URL | Date | SRC |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc | 2022-07-19 | |
http://rhn.redhat.com/errata/RHSA-2006-0688.html | 2022-07-19 | |
http://secunia.com/advisories/21768 | 2022-07-19 | |
http://secunia.com/advisories/22004 | 2022-07-19 | |
http://secunia.com/advisories/22069 | 2022-07-19 | |
http://secunia.com/advisories/22225 | 2022-07-19 | |
http://secunia.com/advisories/22440 | 2022-07-19 | |
http://www.debian.org/security/2006/dsa-1206 | 2022-07-19 | |
http://www.novell.com/linux/security/advisories/2006_52_php.html | 2022-07-19 | |
http://www.php.net/ChangeLog-5.php#5.1.5 | 2022-07-19 | |
http://www.redhat.com/support/errata/RHSA-2006-0669.html | 2022-07-19 | |
http://www.redhat.com/support/errata/RHSA-2006-0682.html | 2022-07-19 | |
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt | 2022-07-19 | |
http://www.ubuntu.com/usn/usn-342-1 | 2022-07-19 | |
https://access.redhat.com/security/cve/CVE-2006-4482 | 2006-10-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1618186 | 2006-10-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | < 5.1.5 Search vendor "Php" for product "Php" and version " < 5.1.5" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 5.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "5.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 5.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "5.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.06 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 3.1 Search vendor "Debian" for product "Debian Linux" and version "3.1" | - |
Affected
|