CVE-2006-3016
Summary
| CVE | CVE-2006-3016 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-06-14 23:02:00 UTC |
| Updated | 2018-10-18 16:45:00 UTC |
| Description | Unspecified vulnerability in session.c in PHP before 5.1.3 has unknown impact and attack vectors, related to "certain characters in session names," including special characters that are frequently associated with CRLF injection, SQL injection, cross-site scripting (XSS), and HTTP response splitting vulnerabilities. NOTE: while the nature of the vulnerability is unspecified, it is likely that this is related to a violation of an expectation by PHP applications that the session name is alphanumeric, as implied in the PHP manual for session_name(). |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| Red Hat update for php - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| Avaya Products PHP Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| SecurityTracker.com Archives - PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact | SECTRACK | securitytracker.com | |
| Red Hat update for php - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| ASA-2006-222 (RHSA-2006-0669) | CONFIRM | support.avaya.com | |
| 25253 | OSVDB | www.osvdb.org | |
| usn/usn-320-1 - Ubuntu: Linux for human beings | UBUNTU | www.ubuntu.com | |
| PHP: PHP 5.1.3 Release Announcement | CONFIRM | www.php.net | |
| rPath update for php - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| access.redhat.com | REDHAT | www.redhat.com | |
| 20061001-01-P | SGI | patches.sgi.com | |
| Red Hat Stronghold update for php - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| ASA-2006-221 (RHSA-2006-0682) | CONFIRM | support.avaya.com | |
| PHP Multiple Unspecified Vulnerabilities | BID | www.securityfocus.com | Exploit, Patch |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | |
| rhn.redhat.com | Red Hat Support | REDHAT | rhn.redhat.com | |
| PHP Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Mandriva update for php - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| 404 Not Found | TURBO | www.turbolinux.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| [#RPL-683] Multiple Vulnerabilities in PHP CVE-2006-1494 CVE-2006-1990 CVE-2006-3016 CVE-2006-3017 CVE-2006-4482 CVE-2006-4484 CVE-2006-4486 - rPath JIRA | CONFIRM | issues.rpath.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.