CVE-2006-1017
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/03/2006
Last modified:
03/04/2025
Description
The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.php.net/bug.php?id=37265
- http://secunia.com/advisories/18694
- http://secunia.com/advisories/21050
- http://secunia.com/advisories/21546
- http://securityreason.com/securityalert/516
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A122
- http://www.osvdb.org/23535
- http://www.php.net/ChangeLog-5.php#5.1.5
- http://www.php.net/release_5_1_5.php
- http://www.securityfocus.com/archive/1/426339/100/0/threaded
- http://www.vupen.com/english/advisories/2006/0772
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24964
- http://bugs.php.net/bug.php?id=37265
- http://secunia.com/advisories/18694
- http://secunia.com/advisories/21050
- http://secunia.com/advisories/21546
- http://securityreason.com/securityalert/516
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A122
- http://www.osvdb.org/23535
- http://www.php.net/ChangeLog-5.php#5.1.5
- http://www.php.net/release_5_1_5.php
- http://www.securityfocus.com/archive/1/426339/100/0/threaded
- http://www.vupen.com/english/advisories/2006/0772
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24964