SB2018103064 - Multiple vulnerabilities in PHP
Published: October 30, 2018 Updated: June 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2006-3017)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.
2) Resource management error (CVE-ID: CVE-2006-1991)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The substr_compare function in string.c in PHP 5.1.2 allows context-dependent attackers to cause a denial of service (memory access violation) via an out-of-bounds offset argument.
Remediation
Install update from vendor's website.
References
- ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
- http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0166.html
- http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&r1=1.87.4.8.2.1&r2=1.87.4.8.2.2
- http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&view=log
- http://rhn.redhat.com/errata/RHSA-2006-0549.html
- http://secunia.com/advisories/19927
- http://secunia.com/advisories/21031
- http://secunia.com/advisories/21050
- http://secunia.com/advisories/21125
- http://secunia.com/advisories/21135
- http://secunia.com/advisories/21202
- http://secunia.com/advisories/21252
- http://secunia.com/advisories/21723
- http://secunia.com/advisories/22225
- http://secunia.com/advisories/22713
- http://securitytracker.com/id?1016306
- http://securitytracker.com/id?1016649
- http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm
- http://www.debian.org/security/2006/dsa-1206
- http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
- http://www.novell.com/linux/security/advisories/2006_31_php.html
- http://www.novell.com/linux/security/advisories/2006_34_php4.html
- http://www.osvdb.org/25255
- http://www.osvdb.org/26466
- http://www.php.net/release_5_1_3.php
- http://www.redhat.com/support/errata/RHSA-2006-0567.html
- http://www.redhat.com/support/errata/RHSA-2006-0568.html
- http://www.securityfocus.com/archive/1/442437/100/0/threaded
- http://www.securityfocus.com/archive/1/447866/100/0/threaded
- http://www.securityfocus.com/bid/17843
- http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27396
- https://issues.rpath.com/browse/RPL-683
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10118
- https://usn.ubuntu.com/320-1/
- http://secunia.com/advisories/20052
- http://secunia.com/advisories/20269
- http://secunia.com/advisories/20676
- http://security.gentoo.org/glsa/glsa-200605-08.xml
- http://securitytracker.com/id?1015979
- http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:091
- http://www.ubuntu.com/usn/usn-320-1
- http://www.vupen.com/english/advisories/2006/1500
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26003