Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-4020
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-08 Aug, 2006 | 20:04
Updated At-03 Apr, 2025 | 01:03

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.0
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.2
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.5
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.6
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.0
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.1
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.2
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2
cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
The PHP Group
php
>>php>>4.2.0
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.1
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.2
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.3
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.0
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.1
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.2
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.3
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.4
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.5
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.6
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.7
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.8
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.9
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.10
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.11
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.0
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.1
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.2
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.3
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

A Patch(es) addressing this vulnerability can be found here: http://snaps.php.net/

Vendor Statements

References
HyperlinkSourceResource
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascsecalert@redhat.com
N/A
http://bugs.php.net/bug.php?id=38322secalert@redhat.com
Exploit
Patch
http://rhn.redhat.com/errata/RHSA-2006-0688.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2006-0736.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/21403secalert@redhat.com
N/A
http://secunia.com/advisories/21467secalert@redhat.com
N/A
http://secunia.com/advisories/21546secalert@redhat.com
N/A
http://secunia.com/advisories/21608secalert@redhat.com
N/A
http://secunia.com/advisories/21683secalert@redhat.com
N/A
http://secunia.com/advisories/21768secalert@redhat.com
N/A
http://secunia.com/advisories/21847secalert@redhat.com
N/A
http://secunia.com/advisories/22004secalert@redhat.com
N/A
http://secunia.com/advisories/22039secalert@redhat.com
N/A
http://secunia.com/advisories/22069secalert@redhat.com
N/A
http://secunia.com/advisories/22440secalert@redhat.com
N/A
http://secunia.com/advisories/22487secalert@redhat.com
N/A
http://secunia.com/advisories/22538secalert@redhat.com
N/A
http://secunia.com/advisories/23247secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200608-28.xmlsecalert@redhat.com
N/A
http://securityreason.com/securityalert/1341secalert@redhat.com
N/A
http://securitytracker.com/id?1016984secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htmsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:144secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_19_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_20_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_22_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_52_php.htmlsecalert@redhat.com
N/A
http://www.php.net/ChangeLog-5.php#5.1.5secalert@redhat.com
N/A
http://www.php.net/release_5_1_5.phpsecalert@redhat.com
N/A
http://www.plain-text.info/sscanf_bug.txtsecalert@redhat.com
Exploit
URL Repurposed
http://www.redhat.com/support/errata/RHSA-2006-0669.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0682.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/442438/30/0/threadedsecalert@redhat.com
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/19415secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-342-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3193secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11062secalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://bugs.php.net/bug.php?id=38322af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://rhn.redhat.com/errata/RHSA-2006-0688.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2006-0736.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21403af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21467af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21546af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21608af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21683af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21768af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21847af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22004af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22039af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22069af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22440af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22487af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22538af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23247af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-200608-28.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/1341af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1016984af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-223.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:144af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_19_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_20_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_22_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_52_php.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.php.net/ChangeLog-5.php#5.1.5af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.php.net/release_5_1_5.phpaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.plain-text.info/sscanf_bug.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
URL Repurposed
http://www.redhat.com/support/errata/RHSA-2006-0669.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0682.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/442438/30/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/19415af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-342-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3193af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11062af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found