Summary
This host is running PHP and is prone to format string vulnerability.
Impact
Successful exploitation could allow attackers to obtain sensitive information and possibly execute arbitrary code via a crafted phar:// URI.
Impact Level: Network
Solution
Upgrade to PHP version 5.3.4 or later,
For updates refer to http://www.php.net/downloads.php
Insight
The flaws are due to:
- An error in 'stream.c' in the phar extension, which allows attackers to obtain sensitive information.
- An error in 'open_wrappers.c', allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename.
- An error in 'mb_strcut()' function in 'Libmbfl' , allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).
Affected
PHP version 5.3 through 5.3.3
References
Severity
Classification
-
CVE CVE-2010-2950, CVE-2010-3436, CVE-2010-4156 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities