Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8617

Опубликовано: 12 дек. 2015
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Enterprise Linux 6phpNot affected
Red Hat Enterprise Linux 7phpNot affected
Red Hat OpenShift Enterprise 2phpNot affected
Red Hat Software Collectionsphp54-phpNot affected
Red Hat Software Collectionsphp55-phpNot affected
Red Hat Software Collectionsrh-php56-phpNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-134
https://bugzilla.redhat.com/show_bug.cgi?id=1293880php: Format string vulnerability in class name error message

EPSS

Процентиль: 96%
0.26437
Средний

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

CVSS3: 9.8
nvd
больше 9 лет назад

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

CVSS3: 9.8
debian
больше 9 лет назад

Format string vulnerability in the zend_throw_or_error function in Zen ...

CVSS3: 9.8
github
больше 3 лет назад

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

fstec
больше 9 лет назад

Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.26437
Средний

6.8 Medium

CVSS2