Summary
This host is running PHP and is prone to Use After Free vulnerability.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of a web server. Failed attempts will likely result in denial-of-service conditions.
Impact Level: Network
Solution
Upgrade to PHP version 5.3.7 or later.
For updates refer to http://www.php.net/downloads.php
Insight
The flaw is due to passing the same variable multiple times to the 'substr_replace()' function, which makes the PHP to use the same pointer in three variables inside the function.
Affected
PHP version 5.3.6 and prior.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2011-1148 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities