Vulnerability Description
The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 4.0 |
References
- http://secunia.com/advisories/19599ExploitPatchVendor Advisory
- http://secunia.com/advisories/19775
- http://secunia.com/advisories/21125
- http://securityreason.com/achievement_securityalert/37ExploitPatch
- http://securityreason.com/securityalert/678
- http://securitytracker.com/id?1015882
- http://us.php.net/releases/5_1_3.php
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:074
- http://www.osvdb.org/24487
- http://www.securityfocus.com/archive/1/430461/100/0/threaded
- http://www.securityfocus.com/archive/1/440869/100/0/threaded
- http://www.securityfocus.com/archive/1/441210/100/0/threaded
- http://www.securityfocus.com/bid/17439
- http://www.ubuntu.com/usn/usn-320-1
- http://www.vupen.com/english/advisories/2006/1290
FAQ
What is CVE-2006-1608?
CVE-2006-1608 is a vulnerability with a CVSS score of 2.1 (LOW). The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.
How severe is CVE-2006-1608?
CVE-2006-1608 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1608?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.