CVE-2006-3016

Unspecified vulnerability in session.c in PHP before 5.1.3 has unknown impact and attack vectors, related to "certain characters in session names," including special characters that are frequently associated with CRLF injection, SQL injection, cross-site scripting (XSS), and HTTP response splitting vulnerabilities. NOTE: while the nature of the vulnerability is unspecified, it is likely that this is related to a violation of an expectation by PHP applications that the session name is alphanumeric, as implied in the PHP manual for session_name().
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://rhn.redhat.com/errata/RHSA-2006-0736.html
http://secunia.com/advisories/19927 Patch Vendor Advisory
http://secunia.com/advisories/21050 Patch Vendor Advisory
http://secunia.com/advisories/22004 Vendor Advisory
http://secunia.com/advisories/22069 Vendor Advisory
http://secunia.com/advisories/22225 Vendor Advisory
http://secunia.com/advisories/22440 Vendor Advisory
http://secunia.com/advisories/22487 Vendor Advisory
http://secunia.com/advisories/23247 Vendor Advisory
http://securitytracker.com/id?1016306
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.osvdb.org/25253
http://www.php.net/release_5_1_3.php
http://www.redhat.com/support/errata/RHSA-2006-0669.html
http://www.redhat.com/support/errata/RHSA-2006-0682.html
http://www.securityfocus.com/archive/1/447866/100/0/threaded
http://www.securityfocus.com/bid/17843 Exploit Patch
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.ubuntu.com/usn/usn-320-1
https://issues.rpath.com/browse/RPL-683
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://rhn.redhat.com/errata/RHSA-2006-0736.html
http://secunia.com/advisories/19927 Patch Vendor Advisory
http://secunia.com/advisories/21050 Patch Vendor Advisory
http://secunia.com/advisories/22004 Vendor Advisory
http://secunia.com/advisories/22069 Vendor Advisory
http://secunia.com/advisories/22225 Vendor Advisory
http://secunia.com/advisories/22440 Vendor Advisory
http://secunia.com/advisories/22487 Vendor Advisory
http://secunia.com/advisories/23247 Vendor Advisory
http://securitytracker.com/id?1016306
http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.osvdb.org/25253
http://www.php.net/release_5_1_3.php
http://www.redhat.com/support/errata/RHSA-2006-0669.html
http://www.redhat.com/support/errata/RHSA-2006-0682.html
http://www.securityfocus.com/archive/1/447866/100/0/threaded
http://www.securityfocus.com/bid/17843 Exploit Patch
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.ubuntu.com/usn/usn-320-1
https://issues.rpath.com/browse/RPL-683
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597
Configurations

Configuration 1 (hide)

cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc -
References () http://rhn.redhat.com/errata/RHSA-2006-0736.html - () http://rhn.redhat.com/errata/RHSA-2006-0736.html -
References () http://secunia.com/advisories/19927 - Patch, Vendor Advisory () http://secunia.com/advisories/19927 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21050 - Patch, Vendor Advisory () http://secunia.com/advisories/21050 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22004 - Vendor Advisory () http://secunia.com/advisories/22004 - Vendor Advisory
References () http://secunia.com/advisories/22069 - Vendor Advisory () http://secunia.com/advisories/22069 - Vendor Advisory
References () http://secunia.com/advisories/22225 - Vendor Advisory () http://secunia.com/advisories/22225 - Vendor Advisory
References () http://secunia.com/advisories/22440 - Vendor Advisory () http://secunia.com/advisories/22440 - Vendor Advisory
References () http://secunia.com/advisories/22487 - Vendor Advisory () http://secunia.com/advisories/22487 - Vendor Advisory
References () http://secunia.com/advisories/23247 - Vendor Advisory () http://secunia.com/advisories/23247 - Vendor Advisory
References () http://securitytracker.com/id?1016306 - () http://securitytracker.com/id?1016306 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 -
References () http://www.osvdb.org/25253 - () http://www.osvdb.org/25253 -
References () http://www.php.net/release_5_1_3.php - () http://www.php.net/release_5_1_3.php -
References () http://www.redhat.com/support/errata/RHSA-2006-0669.html - () http://www.redhat.com/support/errata/RHSA-2006-0669.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0682.html - () http://www.redhat.com/support/errata/RHSA-2006-0682.html -
References () http://www.securityfocus.com/archive/1/447866/100/0/threaded - () http://www.securityfocus.com/archive/1/447866/100/0/threaded -
References () http://www.securityfocus.com/bid/17843 - Exploit, Patch () http://www.securityfocus.com/bid/17843 - Exploit, Patch
References () http://www.turbolinux.com/security/2006/TLSA-2006-38.txt - () http://www.turbolinux.com/security/2006/TLSA-2006-38.txt -
References () http://www.ubuntu.com/usn/usn-320-1 - () http://www.ubuntu.com/usn/usn-320-1 -
References () https://issues.rpath.com/browse/RPL-683 - () https://issues.rpath.com/browse/RPL-683 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597 -

Information

Published : 2006-06-14 23:02

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3016

Mitre link : CVE-2006-3016

CVE.ORG link : CVE-2006-3016


JSON object : View

Products Affected

php_group

  • php