CVE-2006-2660
Published Jun 13, 2006
Last updated 6 years ago
Overview
- Description
- Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Red HatThis is not an issue that affects users of Red Hat Enterprise Linux. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=196255
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BF57C14-86B6-419A-BAFF-93D01CB1E081" }, { "criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC" }, { "criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B" }, { "criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C" }, { "criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14" }, { "criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D" }, { "criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68" }, { "criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989" }, { "criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53" }, { "criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E" }, { "criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D" }, { "criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D" }, { "criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2" }, { "criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC" }, { "criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3" }, { "criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0" }, { "criteria": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA" }, { "criteria": "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5245F990-B4A7-4ED8-909D-B8137CE79FAA" }, { "criteria": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5652D5B0-68E4-4239-B9B7-599AFCF4C53E" }, { "criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C" }, { "criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA" }, { "criteria": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3F9DF9D-15E5-4387-ABE3-A7583331A928" }, { "criteria": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11579E5C-D7CF-46EE-B015-5F4185C174E7" }, { "criteria": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C69CDE21-2FD4-4529-8F02-8709CF5E3D7E" }, { "criteria": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "221B9AC4-C63C-4386-B3BD-E4BC102C6124" }, { "criteria": "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78B7BA75-2A32-4A8E-ADF8-BCB4FC48CB5C" }, { "criteria": "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BEA491B-77FD-4760-8F6F-3EBC6BD810D9" }, { "criteria": "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB25CFBB-347C-479E-8853-F49DD6CBD7D4" }, { "criteria": "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D2937B3-D034-400E-84F5-33833CE3764D" }, { "criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0" } ], "operator": "OR" } ] } ]