Upstream information
Description
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 4.6 |
Vector | AV:L/AC:L/Au:N/C:P/I:P/A:P |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- SUSE-SA:2006:052, published Thu, 21 Sep 2006 12:00:00 +0000
- SUSE-SR:2006:019, published Wed, 09 Aug 2006 15:00:00 +0000
- SUSE-SR:2006:020, published Mon, 14 Aug 2006 17:00:00 +0000
- SUSE-SR:2006:022, published Fri, 08 Sep 2006 17:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 05:08:36 2013CVE page last modified: Fri Dec 8 16:17:20 2023