Описание
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | php | Not affected | ||
Red Hat Enterprise Linux 5 | php53 | Will not fix | ||
Red Hat Enterprise Linux 6 | php | Will not fix | ||
Red Hat Enterprise Linux 7 | php | Will not fix | ||
Red Hat Software Collections | php54-php | Will not fix | ||
Red Hat Software Collections | php55-php | Will not fix | ||
Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-php56 | Fixed | RHSA-2016:2750 | 15.11.2016 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-php56-php | Fixed | RHSA-2016:2750 | 15.11.2016 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-php56-php-pear | Fixed | RHSA-2016:2750 | 15.11.2016 |
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS | rh-php56 | Fixed | RHSA-2016:2750 | 15.11.2016 |
Показывать по
Дополнительная информация
Статус:
4.5 Medium
CVSS3
4.1 Medium
CVSS2
Связанные уязвимости
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x ...
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
Уязвимость интерпретатора PHP и операционной системы Mac OS X, позволяющая нарушителю выполнить произвольный код
4.5 Medium
CVSS3
4.1 Medium
CVSS2