Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Php | Php | 5.3.0 (including) | 5.3.0 (including) |
Php | Php | 5.3.1 (including) | 5.3.1 (including) |
Php | Php | 5.3.2 (including) | 5.3.2 (including) |
Php | Php | 5.3.3 (including) | 5.3.3 (including) |
Red Hat Enterprise Linux 5 | RedHat | php53-0:5.3.3-13.el5_8 | * |
Red Hat Enterprise Linux 6 | RedHat | php-0:5.3.3-14.el6_3 | * |
Php5 | Ubuntu | devel | * |
Php5 | Ubuntu | lucid | * |