[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-4486

Date: (C)2006-08-31   (M)2017-10-12
 
CVSS Score: 2.6Access Vector: NETWORK
Exploitability Subscore: 4.9Access Complexity: HIGH
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

Reference:
SECTRACK-1016984
BID-19582
20061001-01-P
http://www.securityfocus.com/archive/1/archive/1/447866/100/0/threaded
SECUNIA-21546
SECUNIA-22004
SECUNIA-22069
SECUNIA-22225
SECUNIA-22331
SECUNIA-22440
SECUNIA-22487
SECUNIA-22538
SECUNIA-25945
DSA-1331
RHSA-2006:0669
RHSA-2006:0682
RHSA-2006:0688
SUSE-SA:2006:052
TLSA-2006-38
USN-362-1
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm
http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14
http://www.php.net/ChangeLog-5.php#5.1.6
http://www.php.net/release_5_1_6.php
https://issues.rpath.com/browse/RPL-683

CPE    6
cpe:/a:php:php:5.1.4
cpe:/a:php:php:5.1.5
cpe:/a:php:php:5.1.0
cpe:/a:php:php:5.1
...
CWE    1
CWE-189

© 2013 SecPod Technologies