CVE编号
CVE-2006-1990利用情况
暂无补丁情况
N/A披露时间
2006-04-25漏洞描述
PHP 4.4.2和5.1.2中string.c中的wordwrap函数中的整数溢出可能允许上下文相关的攻击者通过某些长参数执行任意代码,从而导致分配一个小的缓冲区,从而触发基于堆的缓冲区溢出在memcpy函数调用中,此漏洞与CVE-2002-1396不同。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U | |
http://docs.info.apple.com/article.html?artnum=304829 | |
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html | |
http://rhn.redhat.com/errata/RHSA-2006-0549.html | |
http://secunia.com/advisories/19803 | |
http://secunia.com/advisories/20052 | |
http://secunia.com/advisories/20222 | |
http://secunia.com/advisories/20269 | |
http://secunia.com/advisories/20676 | |
http://secunia.com/advisories/21031 | |
http://secunia.com/advisories/21050 | |
http://secunia.com/advisories/21125 | |
http://secunia.com/advisories/21135 | |
http://secunia.com/advisories/21252 | |
http://secunia.com/advisories/21564 | |
http://secunia.com/advisories/21723 | |
http://secunia.com/advisories/22225 | |
http://secunia.com/advisories/23155 | |
http://security.gentoo.org/glsa/glsa-200605-08.xml | |
http://securitytracker.com/id?1015979 | |
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm | |
http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm | |
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:091 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 | |
http://www.novell.com/linux/security/advisories/2006_31_php.html | |
http://www.redhat.com/support/errata/RHSA-2006-0501.html | |
http://www.redhat.com/support/errata/RHSA-2006-0568.html | |
http://www.securityfocus.com/archive/1/447866/100/0/threaded | |
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt | |
http://www.ubuntu.com/usn/usn-320-1 | |
http://www.us-cert.gov/cas/techalerts/TA06-333A.html | |
http://www.vupen.com/english/advisories/2006/1500 | |
http://www.vupen.com/english/advisories/2006/4750 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26001 | |
https://issues.rpath.com/browse/RPL-683 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | php | php | 4.4.2 | - | |||||
运行在以下环境 | |||||||||
应用 | php | php | 5.1.2 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...