// For flags

CVE-2006-5465

PHP buffer overflow

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.

Desbordamiento de búfer en PHP anterior a 5.2.0 permite a un atacante remoto ejecutar código de su elección mediante entradas UTF-8 manipuladas a las funciones (1) htmlentities o (2) htmlspecialchars.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-10-23 CVE Reserved
  • 2006-11-04 CVE Published
  • 2023-10-15 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (50)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=304829 X_refsource_confirm
http://issues.rpath.com/browse/RPL-761 X_refsource_confirm
http://secunia.com/advisories/22653 Third Party Advisory
http://secunia.com/advisories/22685 Third Party Advisory
http://secunia.com/advisories/22688 Third Party Advisory
http://secunia.com/advisories/22693 Third Party Advisory
http://secunia.com/advisories/22713 Third Party Advisory
http://secunia.com/advisories/22753 Third Party Advisory
http://secunia.com/advisories/22759 Third Party Advisory
http://secunia.com/advisories/22779 Third Party Advisory
http://secunia.com/advisories/22881 Third Party Advisory
http://secunia.com/advisories/22929 Third Party Advisory
http://secunia.com/advisories/23139 Third Party Advisory
http://secunia.com/advisories/23155 Third Party Advisory
http://secunia.com/advisories/23247 Third Party Advisory
http://secunia.com/advisories/24606 Third Party Advisory
http://secunia.com/advisories/25047 Third Party Advisory
http://securitytracker.com/id?1017152 Vdb Entry
http://securitytracker.com/id?1017296 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm X_refsource_confirm
http://www.hardened-php.net/advisory_132006.138.html X_refsource_misc
http://www.php.net/releases/5_2_0.php X_refsource_confirm
http://www.securityfocus.com/archive/1/450431/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/451098/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/453024/100/0/threaded Mailing List
http://www.securityfocus.com/bid/20879 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA06-333A.html Third Party Advisory
http://www.vupen.com/english/advisories/2006/4317 Vdb Entry
http://www.vupen.com/english/advisories/2006/4749 Vdb Entry
http://www.vupen.com/english/advisories/2006/4750 Vdb Entry
http://www.vupen.com/english/advisories/2007/1546 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
<= 5.1.6
Search vendor "Php" for product "Php" and version " <= 5.1.6"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0
Search vendor "Php" for product "Php" and version "5.0"
rc1
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0
Search vendor "Php" for product "Php" and version "5.0"
rc2
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0
Search vendor "Php" for product "Php" and version "5.0"
rc3
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.0
Search vendor "Php" for product "Php" and version "5.0.0"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.1
Search vendor "Php" for product "Php" and version "5.0.1"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.2
Search vendor "Php" for product "Php" and version "5.0.2"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.3
Search vendor "Php" for product "Php" and version "5.0.3"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.4
Search vendor "Php" for product "Php" and version "5.0.4"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.0.5
Search vendor "Php" for product "Php" and version "5.0.5"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.0
Search vendor "Php" for product "Php" and version "5.1.0"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.1
Search vendor "Php" for product "Php" and version "5.1.1"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.2
Search vendor "Php" for product "Php" and version "5.1.2"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.3
Search vendor "Php" for product "Php" and version "5.1.3"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.4
Search vendor "Php" for product "Php" and version "5.1.4"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.1.5
Search vendor "Php" for product "Php" and version "5.1.5"
-
Affected