Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Php | Php | 5.3.0 (including) | 5.3.0 (including) |
| Php | Php | 5.3.1 (including) | 5.3.1 (including) |
| Php | Php | 5.3.2 (including) | 5.3.2 (including) |
| Php | Php | 5.3.3 (including) | 5.3.3 (including) |
| Red Hat Enterprise Linux 5 | RedHat | php53-0:5.3.3-13.el5_8 | * |
| Red Hat Enterprise Linux 6 | RedHat | php-0:5.3.3-14.el6_3 | * |
| Php5 | Ubuntu | devel | * |
| Php5 | Ubuntu | lucid | * |