First published: Thu Aug 31 2006(Updated: )
Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.1.5 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
Ubuntu | =6.06 | |
Debian Linux | =3.1 |
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4482 is classified as having unspecified impact and attack vectors due to multiple heap-based buffer overflows in PHP.
To fix CVE-2006-4482, upgrade PHP to version 5.1.5 or later.
PHP versions prior to 5.1.5 are affected by CVE-2006-4482.
CVE-2006-4482 affects PHP installations on 64-bit systems, especially on Ubuntu and Debian Linux distributions.
The str_repeat and wordwrap functions in PHP are vulnerable due to CVE-2006-4482.