SB2018103063 - Multiple vulnerabilities in PHP



SB2018103063 - Multiple vulnerabilities in PHP

Published: October 30, 2018 Updated: June 8, 2025

Security Bulletin ID SB2018103063
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2006-4481)

The vulnerability allows a local user to execute arbitrary code.

The (1) file_exists and (2) imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CVE-2006-1017.


2) Out-of-bounds write (CVE-ID: CVE-2006-4482)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.


3) Missing Authorization (CVE-ID: CVE-2006-4483)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache.


4) Input validation error (CVE-ID: CVE-2006-4484)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.


5) Input validation error (CVE-ID: CVE-2006-4485)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read.


Remediation

Install update from vendor's website.

References