Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-4072

Опубликовано: 20 мая 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 9.8

Описание

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

5.5.9+dfsg-1ubuntu4.16
precise

released

5.3.10-1ubuntu3.22
trusty

released

5.5.9+dfsg-1ubuntu4.16
trusty/esm

not-affected

5.5.9+dfsg-1ubuntu4.16
upstream

released

5.6.20+dfsg-1
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

5.6.11+dfsg-1ubuntu3.2
xenial

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

7.0.8-3ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

7.0.4-7ubuntu2.1
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

7.0.5-1
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 4.5
redhat
больше 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
nvd
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
debian
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x ...

CVSS3: 9.8
github
около 3 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

fstec
около 9 лет назад

Уязвимость интерпретатора PHP и операционной системы Mac OS X, позволяющая нарушителю выполнить произвольный код

7.5 High

CVSS2

9.8 Critical

CVSS3