CVE-2006-4812
🔴 Łataj teraz
Przepełnienie całkowitej liczby w PHP umożliwia zdalne wykonanie kodu przez nieprawidłowe dane.
CVSS
10.0
EPSS
39.4%
Exploit
none
Vendor
php
Opis źródłowy (NVD)
Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 10.0 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 39.4% |
| Opublikowano (NVD) | 2006-10-10 04:06:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://cvs.php.net/viewvc.cgi/ZendEngine2/zend_alloc.c?r1=1.161&r2=1.162 (secalert@redhat.com)
- http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html (secalert@redhat.com)
- http://rhn.redhat.com/errata/RHSA-2006-0688.html (secalert@redhat.com)
- http://rhn.redhat.com/errata/RHSA-2006-0708.html (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22280 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22281 (secalert@redhat.com)
- http://secunia.com/advisories/22300 (secalert@redhat.com)
- http://secunia.com/advisories/22331 (secalert@redhat.com)
- http://secunia.com/advisories/22338 (secalert@redhat.com)
- http://secunia.com/advisories/22533 (secalert@redhat.com)
- http://secunia.com/advisories/22538 (secalert@redhat.com)
- http://secunia.com/advisories/22650 (secalert@redhat.com)
- http://securityreason.com/securityalert/1691 (secalert@redhat.com)
- http://securitytracker.com/id?1016984 (secalert@redhat.com) [Patch]
- http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm (secalert@redhat.com)
- http://support.avaya.com/elmodocs2/security/ASA-2006-234.htm (secalert@redhat.com)
- http://www.gentoo.org/security/en/glsa/glsa-200610-14.xml (secalert@redhat.com)
- http://www.hardened-php.net/advisory_092006.133.html (secalert@redhat.com) [Vendor Advisory]
- http://www.hardened-php.net/files/CVE-2006-4812.patch (secalert@redhat.com) [Patch]
- http://www.securityfocus.com/archive/1/448014/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/archive/1/448953/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/bid/20349 (secalert@redhat.com)
- http://www.trustix.org/errata/2006/0055 (secalert@redhat.com)
- http://www.ubuntu.com/usn/usn-362-1 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2006/3922 (secalert@redhat.com)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29362 (secalert@redhat.com)