CVE-2006-1014
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
07/03/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
Impacto
Puntuación base 2.0
3.20
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/18694
- http://secunia.com/advisories/19979
- http://www.novell.com/linux/security/advisories/05-05-2006.html
- http://www.osvdb.org/23534
- http://www.securityfocus.com/archive/1/426342/100/0/threaded
- http://www.securityfocus.com/bid/16878
- http://www.vupen.com/english/advisories/2006/0772
- http://secunia.com/advisories/18694
- http://secunia.com/advisories/19979
- http://www.novell.com/linux/security/advisories/05-05-2006.html
- http://www.osvdb.org/23534
- http://www.securityfocus.com/archive/1/426342/100/0/threaded
- http://www.securityfocus.com/bid/16878
- http://www.vupen.com/english/advisories/2006/0772



