scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
References
Configurations
Configuration 1 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.plain-text.info/sscanf_bug.txt - Exploit, URL Repurposed |
Information
Published : 2006-08-08 20:04
Updated : 2024-02-14 01:17
NVD link : CVE-2006-4020
Mitre link : CVE-2006-4020
CVE.ORG link : CVE-2006-4020
JSON object : View
Products Affected
php
- php
CWE