#VU110490 Input validation error in PHP - CVE-2006-1490


| Updated: 2025-06-09

Vulnerability identifier: #VU110490

Vulnerability risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2006-1490

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
PHP
Universal components / Libraries / Scripting languages

Vendor: PHP Group

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.

Mitigation
Install update from vendor's website.

Vulnerable software versions

PHP: 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1, 4.1.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.4, 4.4.1, 4.4.2, 5, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2


External links
https://bugs.gentoo.org/show_bug.cgi?id=127939
https://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?r1=1.112&r2=1.113
https://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?view=log
https://www.securityfocus.com/bid/17296
https://secunia.com/advisories/19383
https://secunia.com/advisories/19499
https://www.trustix.org/errata/2006/0020
https://secunia.com/advisories/19570
https://rhn.redhat.com/errata/RHSA-2006-0276.html
https://secunia.com/advisories/19832
https://www.novell.com/linux/security/advisories/05-05-2006.html
https://security.gentoo.org/glsa/glsa-200605-08.xml
https://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
https://secunia.com/advisories/20951
https://www.ubuntu.com/usn/usn-320-1
https://docs.info.apple.com/article.html?artnum=304829
https://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
https://www.us-cert.gov/cas/techalerts/TA06-333A.html
https://secunia.com/advisories/23155
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
https://secunia.com/advisories/19979
https://secunia.com/advisories/20052
https://secunia.com/advisories/20210
https://secunia.com/advisories/21125
https://www.mandriva.com/security/advisories?name=MDKSA-2006:063
https://www.vupen.com/english/advisories/2006/1149
https://www.vupen.com/english/advisories/2006/4750
https://www.vupen.com/english/advisories/2006/2685
https://exchange.xforce.ibmcloud.com/vulnerabilities/25508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11084
https://www.securityfocus.com/archive/1/429164/100/0/threaded
https://www.securityfocus.com/archive/1/429162/100/0/threaded


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability