CVE-2015-6527

Related Vulnerabilities: CVE-2015-6527  

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

The MITRE CVE dictionary describes this issue as:

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

Find out more about CVE-2015-6527 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of php and php53 as shipped with Red Hat Enterprise Linux 5 and the versions of php as shipped with Red Hat Enterprise Linux 6 and 7.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux php55-php Not affected
Red Hat Software Collections for Red Hat Enterprise Linux rh-php56-php Not affected
Red Hat Software Collections for Red Hat Enterprise Linux php54-php Not affected
Red Hat OpenShift Enterprise 2 php Not affected
Red Hat Enterprise Linux 7 php Not affected
Red Hat Enterprise Linux 6 php Not affected
Red Hat Enterprise Linux 5 php53 Not affected
Red Hat Enterprise Linux 5 php Not affected