Vulnerability CVE-2015-8617


Published: 2016-01-19

Description:
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

See advisories in our WLB2 database:
Topic
Author
Date
High
PHP 7.0.0 - Format String Vulnerability
Andrew Kramer
24.12.2015

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
PHP -> PHP 

 References:
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1034543
https://bugs.php.net/bug.php?id=71105
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e

Copyright 2024, cxsecurity.com

 

Back to Top