1000
VMScore

CVE-2015-8617

Published: 19/01/2016 Updated: 10/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x prior to 7.0.1 allows remote malicious users to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 7.0.1

Exploits

Overview -------------------------------------------- A fun little format string vulnerability exists in PHP 700 due to how non-existent class names are handled From my limited research I believe this issue is likely exploitable for full code execution (see test script below) This issue does not appear to be present in previous PHP versio ...