CVE-2010-2950
php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
Vulnerabilidad de formato de cadena en stream.c en la extensión phar en PHP v5.3.x hasta v5.3.3 permite a atacantes dependientes del contexto obtener información sensible (contenidos de memoria) y probablemente ejecutar código de su elección a través de URI phar:// manipuladas que no manejan adecuadamente por la función har_stream_flush, dando lugar a errores en la función php_stream_wrapper_log_error. NOTA: Esta vulnerabilidad existe por una solución incompleta para CVE-2010-2094.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-08-04 CVE Reserved
- 2010-09-21 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-134: Use of Externally-Controlled Format String
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://php-security.org/2010/05/14/mops-2010-024-php-phar_stream_flush-format-string-vulnerability/index.html | X_refsource_misc | |
http://security-tracker.debian.org/tracker/CVE-2010-2950 | X_refsource_confirm | |
http://support.apple.com/kb/HT4581 | X_refsource_confirm | |
http://svn.php.net/viewvc?view=revision&revision=302565 | X_refsource_confirm | |
http://www.php.net/ChangeLog-5.php | X_refsource_confirm | |
http://www.php.net/archive/2010.php#id2010-12-10-1 | X_refsource_confirm | |
http://www.php.net/releases/5_3_4.php | X_refsource_confirm | |
https://bugzilla.redhat.com/show_bug.cgi?id=598537 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html | 2024-08-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.0 Search vendor "Php" for product "Php" and version "5.3.0" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.1 Search vendor "Php" for product "Php" and version "5.3.1" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.2 Search vendor "Php" for product "Php" and version "5.3.2" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.3 Search vendor "Php" for product "Php" and version "5.3.3" | - |
Affected
|