Format string error in PHP - CVE-2006-0200
Published: October 30, 2018 / Updated: June 8, 2025
Vulnerability identifier: #VU110494
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2006-0200
CWE-ID: CWE-134
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: PHP Group
Affected software:
PHP
PHP
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages.
How to mitigate CVE-2006-0200
Install update from vendor's website.
Sources
- http://secunia.com/advisories/18431
- http://securityreason.com/securityalert/337
- http://securitytracker.com/id?1015485
- http://www.hardened-php.net/advisory_022006.113.html
- http://www.php.net/release_5_1_2.php
- http://www.securityfocus.com/archive/1/421705/100/0/threaded
- http://www.securityfocus.com/bid/16219
- http://www.vupen.com/english/advisories/2006/0177
- http://www.vupen.com/english/advisories/2006/0369
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24095