Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2783

Опубликовано: 16 апр. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

A buffer over-read flaw was found in PHP's phar (PHP Archive) paths implementation. A malicious script author could possibly use this flaw to disclose certain portions of server memory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Software Collectionsphp54-phpAffected
Red Hat Enterprise Linux 6phpFixedRHSA-2015:121809.07.2015
Red Hat Enterprise Linux 7phpFixedRHSA-2015:113523.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php54FixedRHSA-2015:106604.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2015:106604.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php54-php-pecl-zendopcacheFixedRHSA-2015:106604.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2015:118625.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2015:118725.06.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1213446php: buffer over-read in Phar metadata parsing

EPSS

Процентиль: 93%
0.09675
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

nvd
около 10 лет назад

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

debian
около 10 лет назад

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x b ...

github
около 3 лет назад

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

CVSS3: 5.4
fstec
около 10 лет назад

Уязвимость компонента ext/phar/phar.c языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.09675
Низкий

4.3 Medium

CVSS2

Уязвимость CVE-2015-2783