Vulnerability Description
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.1.6 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
- http://docs.info.apple.com/article.html?artnum=304829
- http://issues.rpath.com/browse/RPL-761
- http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2006-0736.html
- http://secunia.com/advisories/22653
- http://secunia.com/advisories/22685
- http://secunia.com/advisories/22688
- http://secunia.com/advisories/22693
- http://secunia.com/advisories/22713
- http://secunia.com/advisories/22753
- http://secunia.com/advisories/22759
- http://secunia.com/advisories/22779
- http://secunia.com/advisories/22881
- http://secunia.com/advisories/22929
FAQ
What is CVE-2006-5465?
CVE-2006-5465 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
How severe is CVE-2006-5465?
CVE-2006-5465 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5465?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.