Upstream information
Description
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 4.6 | 
| Vector | AV:L/AC:L/Au:N/C:P/I:P/A:P | 
| Access Vector | Local | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | Partial | 
SUSE Security Advisories:
- SUSE-SA:2006:052, published Thu, 21 Sep 2006 12:00:00 +0000
 - SUSE-SR:2006:019, published Wed, 09 Aug 2006 15:00:00 +0000
 - SUSE-SR:2006:020, published Mon, 14 Aug 2006 17:00:00 +0000
 - SUSE-SR:2006:022, published Fri, 08 Sep 2006 17:00:00 +0000
 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 05:08:36 2013CVE page last modified: Mon Oct 6 18:14:47 2025