CVE-2006-2660

NameCVE-2006-2660
DescriptionBuffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php4source(unstable)4:4.4.4-1unimportant
php5source(unstable)5.1.6-1unimportant

Notes

using a long enough path (>MAXPATHLEN) allows you to have
tempnam create a file without the temp extension. sounds like
another shoot yourself in the foot issue, since the local user
could just as easily create the file manually, and if the
tempnam function is taking unsanitized input, it's an
application error

Search for package or bug name: Reporting problems