6.8
CVSSv2

CVE-2010-2094

Published: 27/05/2010 Updated: 26/01/2011
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple format string vulnerabilities in the phar extension in PHP 5.3 prior to 5.3.2 allow context-dependent malicious users to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the (1) phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or (4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5) phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers errors in the php_stream_wrapper_log_error function.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.3.0

php php 5.3.1

Vendor Advisories

Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc requests An attacker could exploit this issue to cause the PHP server to crash, resulting in a denial of service This issue only affected Ubuntu 606 LTS, 804 LTS, 904 and 910 (CVE-2010-0397) ...

Exploits

source: wwwsecurityfocuscom/bid/40173/info PHP is prone to multiple format-string vulnerabilities because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function Attackers can exploit these issues to run arbitrary code within the context of the PHP process This may a ...