National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2006-1549 Detail

Current Description

PHP 4.4.2 and 5.1.2 allows local users to cause a crash (segmentation fault) by defining and executing a recursive function. NOTE: it has been reported by a reliable third party that some later versions are also affected.

Source:  MITRE      Last Modified:  04/10/2006      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2006-1549
Original release date:
04/10/2006
Last revised:
07/19/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
2.1 LOW
Vector:
(AV:L/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Evaluator Solution

Upgrade to PHP 5.1.3-RC3

Vendor Statements (disclaimer)

Official Statement from Red Hat (04/16/2007)

The PHP interpreter does not offer a reliable "sandboxed" security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://securityreason.com/achievement_securityalert/35 Exploit External Source SREASONRES 20060408 function *() php/apache Crash PHP 4.4.2 and 5.1.2
http://securityreason.com/securityalert/2312 External Source SREASON 2312
http://securityreason.com/securityalert/676 External Source SREASON 676
http://securitytracker.com/id?1015880 Exploit External Source SECTRACK 1015880
http://www.php-security.org/MOPB/MOPB-02-2007.html External Source MISC http://www.php-security.org/MOPB/MOPB-02-2007.html
http://www.securityfocus.com/archive/1/archive/1/430453/100/0/threaded Exploit External Source BUGTRAQ 20060409 function *() php/apache Crash PHP 4.4.2 and 5.1.2
http://www.securityfocus.com/archive/1/archive/1/430598/100/0/threaded External Source BUGTRAQ 20060410 Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2
http://www.securityfocus.com/archive/1/archive/1/430742/100/0/threaded External Source BUGTRAQ 20060412 Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2
http://www.securityfocus.com/archive/1/archive/1/431018/100/0/threaded External Source BUGTRAQ 20060414 Re: Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2
http://www.securityfocus.com/bid/22766 External Source BID 22766
http://www.vupen.com/english/advisories/2006/1290 Vendor Advisory External Source VUPEN ADV-2006-1290
https://exchange.xforce.ibmcloud.com/vulnerabilities/25704 External Source XF php-function-dos(25704)

Technical Details

Vulnerability Type (View All)

  • Resource Management Errors (CWE-399)

Change History 2 change records found - show changes