Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1153

Опубликовано: 16 мар. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

5.3.5-1ubuntu7.2
hardy

not-affected

karmic

not-affected

lucid

released

5.3.2-1ubuntu4.8
maverick

released

5.3.3-1ubuntu9.4
natty

released

5.3.5-1ubuntu7.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 76%
0.01008
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

nvd
больше 14 лет назад

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

debian
больше 14 лет назад

Multiple format string vulnerabilities in phar_object.c in the phar ex ...

github
около 3 лет назад

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

EPSS

Процентиль: 76%
0.01008
Низкий

7.5 High

CVSS2