CVE-2006-4020

Properties

Published:
07.08.2006
Updated:
21.08.2010
Patch available:
Severity:
Medium
CVSS vector:
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Product:
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php
php: php

Vulnerability description

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

References:

BUGTRAQ: http://www.securityfocus.com/archive/1/442438/30/0/threaded
CONFIRM: http://bugs.php.net/bug.php?id=38322
BID: http://www.securityfocus.com/bid/19415
MISC: http://www.plain-text.info/sscanf_bug.txt
VUPEN: http://www.frsirt.com/english/advisories/2006/3193
SECUNIA: http://secunia.com/advisories/21403
OVAL: http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11062
UBUNTU: http://www.ubuntu.com/usn/usn-342-1
REDHAT: http://www.redhat.com/support/errata/RHSA-2006-0682.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2006-0669.html
CONFIRM: http://www.php.net/release_5_1_5.php
CONFIRM: http://www.php.net/ChangeLog-5.php#5.1.5
SUSE: http://www.novell.com/linux/security/advisories/2006_52_php.html
SUSE: http://www.novell.com/linux/security/advisories/2006_22_sr.html
SUSE: http://www.novell.com/linux/security/advisories/2006_20_sr.html
SUSE: http://www.novell.com/linux/security/advisories/2006_19_sr.html
MANDRIVA: http://www.mandriva.com/security/advisories?name=MDKSA-2006:144
CONFIRM: http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm
CONFIRM: http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm
CONFIRM: http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm
SECTRACK: http://securitytracker.com/id?1016984
SREASON: http://securityreason.com/securityalert/1341
GENTOO: http://security.gentoo.org/glsa/glsa-200608-28.xml
SECUNIA: http://secunia.com/advisories/23247
SECUNIA: http://secunia.com/advisories/22538
SECUNIA: http://secunia.com/advisories/22487
SECUNIA: http://secunia.com/advisories/22440
SECUNIA: http://secunia.com/advisories/22069
SECUNIA: http://secunia.com/advisories/22039
SECUNIA: http://secunia.com/advisories/22004
SECUNIA: http://secunia.com/advisories/21847
SECUNIA: http://secunia.com/advisories/21768
SECUNIA: http://secunia.com/advisories/21683
SECUNIA: http://secunia.com/advisories/21608
SECUNIA: http://secunia.com/advisories/21546
SECUNIA: http://secunia.com/advisories/21467
REDHAT: http://rhn.redhat.com/errata/RHSA-2006-0736.html
REDHAT: http://rhn.redhat.com/errata/RHSA-2006-0688.html
SGI: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc