SB2018103066 - Multiple vulnerabilities in PHP
Published: October 30, 2018 Updated: June 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Format string error (CVE-ID: CVE-2006-0200)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages.
2) Code Injection (CVE-ID: CVE-2006-0207)
The vulnerability allows a remote non-authenticated attacker to corrupt data.
Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function.
Remediation
Install update from vendor's website.
References
- http://secunia.com/advisories/18431
- http://securityreason.com/securityalert/337
- http://securitytracker.com/id?1015485
- http://www.hardened-php.net/advisory_022006.113.html
- http://www.php.net/release_5_1_2.php
- http://www.securityfocus.com/archive/1/421705/100/0/threaded
- http://www.securityfocus.com/bid/16219
- http://www.vupen.com/english/advisories/2006/0177
- http://www.vupen.com/english/advisories/2006/0369
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24095
- http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
- http://secunia.com/advisories/18697
- http://secunia.com/advisories/19012
- http://secunia.com/advisories/19179
- http://secunia.com/advisories/19355
- http://secunia.com/advisories/25945
- http://securitytracker.com/id?1015484
- http://www.debian.org/security/2007/dsa-1331
- http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml
- http://www.hardened-php.net/advisory_012006.112.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:028
- http://www.securityfocus.com/bid/16220
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24094
- https://usn.ubuntu.com/261-1/