Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
References
Configurations
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://php.net/ChangeLog-7.php - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1034543 - | |
References | () https://bugs.php.net/bug.php?id=71105 - Exploit | |
References | () https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e - |
Information
Published : 2016-01-19 05:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8617
Mitre link : CVE-2015-8617
CVE.ORG link : CVE-2015-8617
JSON object : View
Products Affected
php
- php
CWE
CWE-134
Use of Externally-Controlled Format String