CVE-2006-5465
🟡 Monitoruj
Przepełnienie bufora w PHP umożliwia zdalne wykonanie kodu przez spreparowane dane UTF-8.
CVSS
7.5
EPSS
41.9%
Exploit
none
Vendor
php
Opis źródłowy (NVD)
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
buffer-overflow
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 41.9% |
| Opublikowano (NVD) | 2006-11-04 00:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P (secalert@redhat.com)
- http://docs.info.apple.com/article.html?artnum=304829 (secalert@redhat.com)
- http://issues.rpath.com/browse/RPL-761 (secalert@redhat.com)
- http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html (secalert@redhat.com)
- http://rhn.redhat.com/errata/RHSA-2006-0736.html (secalert@redhat.com)
- http://secunia.com/advisories/22653 (secalert@redhat.com)
- http://secunia.com/advisories/22685 (secalert@redhat.com)
- http://secunia.com/advisories/22688 (secalert@redhat.com)
- http://secunia.com/advisories/22693 (secalert@redhat.com)
- http://secunia.com/advisories/22713 (secalert@redhat.com)
- http://secunia.com/advisories/22753 (secalert@redhat.com)
- http://secunia.com/advisories/22759 (secalert@redhat.com)
- http://secunia.com/advisories/22779 (secalert@redhat.com)
- http://secunia.com/advisories/22881 (secalert@redhat.com)
- http://secunia.com/advisories/22929 (secalert@redhat.com)
- http://secunia.com/advisories/23139 (secalert@redhat.com)
- http://secunia.com/advisories/23155 (secalert@redhat.com)
- http://secunia.com/advisories/23247 (secalert@redhat.com)
- http://secunia.com/advisories/24606 (secalert@redhat.com)
- http://secunia.com/advisories/25047 (secalert@redhat.com)
- http://security.gentoo.org/glsa/glsa-200703-21.xml (secalert@redhat.com)
- http://securitytracker.com/id?1017152 (secalert@redhat.com)
- http://securitytracker.com/id?1017296 (secalert@redhat.com)
- http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm (secalert@redhat.com)
- http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html (secalert@redhat.com)
- http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml (secalert@redhat.com)
- http://www.debian.org/security/2006/dsa-1206 (secalert@redhat.com)
- http://www.hardened-php.net/advisory_132006.138.html (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:196 (secalert@redhat.com)
- http://www.novell.com/linux/security/advisories/2006_67_php.html (secalert@redhat.com)
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html (secalert@redhat.com)
- http://www.php.net/releases/5_2_0.php (secalert@redhat.com)
- http://www.redhat.com/support/errata/RHSA-2006-0730.html (secalert@redhat.com)
- http://www.redhat.com/support/errata/RHSA-2006-0731.html (secalert@redhat.com)
- http://www.securityfocus.com/archive/1/450431/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/archive/1/451098/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/archive/1/453024/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/bid/20879 (secalert@redhat.com)
- http://www.trustix.org/errata/2006/0061/ (secalert@redhat.com)
- http://www.turbolinux.com/security/2006/TLSA-2006-38.txt (secalert@redhat.com)
- http://www.ubuntu.com/usn/usn-375-1 (secalert@redhat.com)
- http://www.us-cert.gov/cas/techalerts/TA06-333A.html (secalert@redhat.com) [US Government Resource]
- http://www.vupen.com/english/advisories/2006/4317 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2006/4749 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2006/4750 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2007/1546 (secalert@redhat.com)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29971 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240 (secalert@redhat.com)