fkie_cve-2006-5465
Vulnerability from fkie_nvd
Published
2006-11-04 00:07
Modified
2024-11-21 00:19
Severity ?
Summary
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=304829
secalert@redhat.comhttp://issues.rpath.com/browse/RPL-761
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2006-0736.html
secalert@redhat.comhttp://secunia.com/advisories/22653
secalert@redhat.comhttp://secunia.com/advisories/22685
secalert@redhat.comhttp://secunia.com/advisories/22688
secalert@redhat.comhttp://secunia.com/advisories/22693
secalert@redhat.comhttp://secunia.com/advisories/22713
secalert@redhat.comhttp://secunia.com/advisories/22753
secalert@redhat.comhttp://secunia.com/advisories/22759
secalert@redhat.comhttp://secunia.com/advisories/22779
secalert@redhat.comhttp://secunia.com/advisories/22881
secalert@redhat.comhttp://secunia.com/advisories/22929
secalert@redhat.comhttp://secunia.com/advisories/23139
secalert@redhat.comhttp://secunia.com/advisories/23155
secalert@redhat.comhttp://secunia.com/advisories/23247
secalert@redhat.comhttp://secunia.com/advisories/24606
secalert@redhat.comhttp://secunia.com/advisories/25047
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200703-21.xml
secalert@redhat.comhttp://securitytracker.com/id?1017152
secalert@redhat.comhttp://securitytracker.com/id?1017296
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
secalert@redhat.comhttp://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
secalert@redhat.comhttp://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1206
secalert@redhat.comhttp://www.hardened-php.net/advisory_132006.138.html
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:196
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_67_php.html
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
secalert@redhat.comhttp://www.php.net/releases/5_2_0.php
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0730.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0731.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/450431/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/451098/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/453024/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/20879
secalert@redhat.comhttp://www.trustix.org/errata/2006/0061/
secalert@redhat.comhttp://www.turbolinux.com/security/2006/TLSA-2006-38.txt
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-375-1
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4317
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4749
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4750
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1546
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/29971
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=304829
af854a3a-2127-422b-91ae-364da2661108http://issues.rpath.com/browse/RPL-761
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2006-0736.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22653
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22685
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22688
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22693
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22713
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22753
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22759
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22779
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22881
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22929
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23139
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23155
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23247
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24606
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25047
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200703-21.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017152
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017296
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1206
af854a3a-2127-422b-91ae-364da2661108http://www.hardened-php.net/advisory_132006.138.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_67_php.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/releases/5_2_0.php
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0730.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0731.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/450431/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/451098/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453024/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/20879
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0061/
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-375-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4317
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4749
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4750
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1546
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
Impacted products
Vendor Product Version
php php *
php php 5.0
php php 5.0
php php 5.0
php php 5.0.0
php php 5.0.1
php php 5.0.2
php php 5.0.3
php php 5.0.4
php php 5.0.5
php php 5.1.0
php php 5.1.1
php php 5.1.2
php php 5.1.3
php php 5.1.4
php php 5.1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C85C56B-D27F-433F-A268-34463619B183",
              "versionEndIncluding": "5.1.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3797AB5-9E49-4251-A212-B6E5D9996764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en PHP anterior a 5.2.0 permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n mediante entradas UTF-8 manipuladas a las funciones (1) htmlentities o (2) htmlspecialchars."
    }
  ],
  "id": "CVE-2006-5465",
  "lastModified": "2024-11-21T00:19:20.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-04T00:07:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=304829"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://issues.rpath.com/browse/RPL-761"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0736.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22653"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22685"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22688"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22693"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22713"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22753"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22759"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22779"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22881"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/22929"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23139"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23155"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23247"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24606"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25047"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200703-21.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017152"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017296"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1206"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.hardened-php.net/advisory_132006.138.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:196"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2006_67_php.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.php.net/releases/5_2_0.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0730.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0731.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/450431/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/451098/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/453024/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/20879"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2006/0061/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-375-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/4317"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/4749"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/4750"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/1546"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29971"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=304829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://issues.rpath.com/browse/RPL-761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0736.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22753"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22779"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200703-21.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.hardened-php.net/advisory_132006.138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_67_php.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/releases/5_2_0.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0730.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0731.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/450431/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451098/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/453024/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0061/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-375-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29971"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.