Unrated severityNVD Advisory· Published Aug 31, 2006· Updated Apr 16, 2026
CVE-2006-4482
CVE-2006-4482
Description
Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
Affected products
5cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
30- cvs.php.net/viewvc.cgi/php-src/ext/standard/string.cnvdBroken LinkPatch
- secunia.com/advisories/21546nvdNot ApplicablePatchVendor Advisory
- www.php.net/release_5_1_5.phpnvdPatchRelease NotesVendor Advisory
- rhn.redhat.com/errata/RHSA-2006-0688.htmlnvdThird Party Advisory
- secunia.com/advisories/21768nvdNot ApplicableVendor Advisory
- secunia.com/advisories/22004nvdNot ApplicableVendor Advisory
- secunia.com/advisories/22069nvdNot ApplicableVendor Advisory
- secunia.com/advisories/22225nvdNot ApplicableVendor Advisory
- secunia.com/advisories/22440nvdNot ApplicableVendor Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- support.avaya.com/elmodocs2/security/ASA-2006-221.htmnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2006-222.htmnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2006-223.htmnvdThird Party Advisory
- www.debian.org/security/2006/dsa-1206nvdThird Party Advisory
- www.php.net/ChangeLog-5.phpnvdRelease NotesVendor Advisory
- www.redhat.com/support/errata/RHSA-2006-0669.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2006-0682.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/447866/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/19582nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-342-1nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121nvdThird Party Advisory
- patches.sgi.com/support/free/security/advisories/20061001-01-P.ascnvdBroken Link
- secunia.com/advisories/22039nvdNot Applicable
- secunia.com/advisories/22487nvdNot Applicable
- secunia.com/advisories/22538nvdNot Applicable
- secunia.com/advisories/22713nvdNot Applicable
- www.novell.com/linux/security/advisories/2006_52_php.htmlnvdBroken Link
- www.turbolinux.com/security/2006/TLSA-2006-38.txtnvdBroken Link
- www.vupen.com/english/advisories/2006/3318nvdPermissions Required
- issues.rpath.com/browse/RPL-683nvdBroken Link
News mentions
0No linked articles in our index yet.