First published: Wed Jun 14 2006(Updated: )
zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.3.9 | |
PHP | =3.0 | |
PHP | =4.0-beta1 | |
PHP | =3.0.5 | |
PHP | =3.0.11 | |
PHP | =5.1.2 | |
PHP | =4.0-beta4 | |
PHP | =4.2.0 | |
PHP | =5.1.1 | |
PHP | =3.0.1 | |
PHP | =3.0.2 | |
PHP | =5.0.0-beta1 | |
PHP | =4.1.0 | |
PHP | =4.3.4 | |
PHP | =4.0.4 | |
PHP | =4.3.0 | |
PHP | =4.0.5 | |
PHP | =5.0-rc1 | |
PHP | =3.0.8 | |
PHP | =5.0.5 | |
PHP | =4.3.6 | |
PHP | =3.0.13 | |
PHP | =5.0.1 | |
PHP | =4.0.7-rc2 | |
PHP | =4.3.7 | |
PHP | =5.0.4 | |
PHP | =4.0.7-rc1 | |
PHP | =4.2.2 | |
PHP | =4.0-rc1 | |
PHP | =3.0.7 | |
PHP | =4.3.2 | |
PHP | =4.3.11 | |
PHP | =4.0.0 | |
PHP | =3.0.6 | |
PHP | =4.0.3-patch1 | |
PHP | =3.0.17 | |
PHP | =4.0.7 | |
PHP | =4.0.2 | |
PHP | =4.3.3 | |
PHP | =5.0-rc3 | |
PHP | =4.1.1 | |
PHP | =3.0.15 | |
PHP | =3.0.16 | |
PHP | =pl1 | |
PHP | =5.0.0-rc2 | |
PHP | =5.0.3 | |
PHP | =3.0.10 | |
PHP | =3.0.4 | |
PHP | =4.2.3 | |
PHP | =5.1.0 | |
PHP | =4.0.1-patch1 | |
PHP | =5.0.0-rc3 | |
PHP | =4.0 | |
PHP | =4.0-beta2 | |
PHP | =4.0.1-patch2 | |
PHP | =4.0.6 | |
PHP | =5.0-rc2 | |
PHP | =4.1.2 | |
PHP | =5.0.0-beta3 | |
PHP | =4.0.7-rc3 | |
PHP | =4.0-rc2 | |
PHP | =4.3.1 | |
PHP | =3.0.18 | |
PHP | =4.0-beta_4_patch1 | |
PHP | =4.4.0 | |
PHP | =4.3.10 | |
PHP | =4.2.1 | |
PHP | =5.0.0-rc1 | |
PHP | =4.0.4-patch1 | |
PHP | =4.0.1 | |
PHP | =5.0.2 | |
PHP | =3.0.12 | |
PHP | =4.2 | |
PHP | =4.4.1 | |
PHP | =4.0-beta3 | |
PHP | =4.0.3 | |
PHP | =3.0.14 | |
PHP | =3.0.9 | |
PHP | =3.0.3 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0 | |
PHP | =4.3.8 | |
PHP | =4.3.5 | |
PHP | =5.0.0-beta2 | |
PHP | <=4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-3017 is considered moderate due to potential security implications associated with variable handling in PHP.
To fix CVE-2006-3017, upgrade to PHP versions 4.4.3, 5.1.3, or higher, where the vulnerability has been patched.
CVE-2006-3017 affects PHP versions prior to 4.4.3 and 5.1.3 including various versions from 3.0 to 5.0.
The risks of CVE-2006-3017 include the possibility of using stale variable data, which can compromise security during execution.
You can identify if your system is vulnerable by checking the PHP version running on your server and comparing it to the affected versions listed in the CVE description.