Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0097

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2006-0097
Last Modified 01 Aug 2011 12:00:00
Published 06 Jan 2006 06:03:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0097

Summary

Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function.

Vulnerable Systems

Application

  • Php 4.3.10

  • Php 4.4.0

  • Php 4.4.1

  • Php 4.4.2


References

VUPEN - ADV-2006-0046

BID - 16145

BUGTRAQ - 20060105 Windows PHP 4.x

CONFIRM - http://www.php.net/ChangeLog-4.php#4.4.3

OSVDB - 22232

SECUNIA - 18275

FULLDISC - 20060108 RE: Windows PHP 4.x

BUGTRAQ - 20060105 Windows PHP 4.x "0-day" buffer overflow

FULLDISC - 20060108 RE: Windows PHP 4.x "0-day" buffer overflow


Last Updated: 27 May 2016 10:42:36