TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2011-1153

N/A

Beschreibung

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht3/16/2011
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

php:php

Schwachen (CWE)

CWE-134

Referenzen

http://bugs.php.net/bug.php?id=54247(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/14/13(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/14/14(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/14/24(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43744(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT5002(af854a3a-2127-422b-91ae-364da2661108)
http://svn.php.net/viewvc?view=revision&revision=309221(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2011/dsa-2266(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/ChangeLog-5.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/archive/2011.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/releases/5_3_6.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/46854(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0744(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0764(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0890(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=688378(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.