ID CVE-2006-1490
Summary PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
References
Vulnerable Configurations
  • cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
    cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
  • cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 13-02-2023 - 02:16)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
oval via4
accepted 2013-04-29T04:11:22.811-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
family unix
id oval:org.mitre.oval:def:11084
status accepted
submitted 2010-07-09T03:56:16-04:00
title PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
version 29
redhat via4
advisories
bugzilla
id 1618036
title CVE-2006-1490 security flaw
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • comment php is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276001
        • comment php is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276002
      • AND
        • comment php-devel is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276003
        • comment php-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276004
      • AND
        • comment php-domxml is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276005
        • comment php-domxml is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276006
      • AND
        • comment php-gd is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276007
        • comment php-gd is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276008
      • AND
        • comment php-imap is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276009
        • comment php-imap is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276010
      • AND
        • comment php-ldap is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276011
        • comment php-ldap is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276012
      • AND
        • comment php-mbstring is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276013
        • comment php-mbstring is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276014
      • AND
        • comment php-mysql is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276015
        • comment php-mysql is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276016
      • AND
        • comment php-ncurses is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276017
        • comment php-ncurses is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276018
      • AND
        • comment php-odbc is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276019
        • comment php-odbc is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276020
      • AND
        • comment php-pear is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276021
        • comment php-pear is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276022
      • AND
        • comment php-pgsql is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276023
        • comment php-pgsql is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276024
      • AND
        • comment php-snmp is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276025
        • comment php-snmp is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276026
      • AND
        • comment php-xmlrpc is earlier than 0:4.3.9-3.12
          oval oval:com.redhat.rhsa:tst:20060276027
        • comment php-xmlrpc is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060276028
rhsa
id RHSA-2006:0276
released 2006-04-25
severity Moderate
title RHSA-2006:0276: php security update (Moderate)
rpms
  • php-0:4.3.2-30.ent
  • php-0:4.3.9-3.12
  • php-debuginfo-0:4.3.2-30.ent
  • php-debuginfo-0:4.3.9-3.12
  • php-devel-0:4.3.2-30.ent
  • php-devel-0:4.3.9-3.12
  • php-domxml-0:4.3.9-3.12
  • php-gd-0:4.3.9-3.12
  • php-imap-0:4.3.2-30.ent
  • php-imap-0:4.3.9-3.12
  • php-ldap-0:4.3.2-30.ent
  • php-ldap-0:4.3.9-3.12
  • php-mbstring-0:4.3.9-3.12
  • php-mysql-0:4.3.2-30.ent
  • php-mysql-0:4.3.9-3.12
  • php-ncurses-0:4.3.9-3.12
  • php-odbc-0:4.3.2-30.ent
  • php-odbc-0:4.3.9-3.12
  • php-pear-0:4.3.9-3.12
  • php-pgsql-0:4.3.2-30.ent
  • php-pgsql-0:4.3.9-3.12
  • php-snmp-0:4.3.9-3.12
  • php-xmlrpc-0:4.3.9-3.12
refmap via4
apple APPLE-SA-2006-11-28
bid 17296
bugtraq
  • 20060328 Critical PHP bug - act ASAP if you are running web with sensitive data
  • 20060328 Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data
cert TA06-333A
confirm
gentoo GLSA-200605-08
mandriva MDKSA-2006:063
misc
secunia
  • 19383
  • 19499
  • 19570
  • 19832
  • 19979
  • 20052
  • 20210
  • 20951
  • 21125
  • 23155
sgi 20060501-01-U
suse SUSE-SA:2006:024
trustix 2006-0020
ubuntu USN-320-1
vupen
  • ADV-2006-1149
  • ADV-2006-2685
  • ADV-2006-4750
xf php-htmlentitydecode-information-disclosure(25508)
Last major update 13-02-2023 - 02:16
Published 29-03-2006 - 21:06
Last modified 13-02-2023 - 02:16
Back to Top