CVE-2011-1153

Current Description

Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.

Basic Data

PublishedMarch 16, 2011
Last ModifiedAugust 17, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-134
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPhpPhp1.0*******
    2.3ApplicationPhpPhp2.0*******
    2.3ApplicationPhpPhp2.0b10*******
    2.3ApplicationPhpPhp3.0*******
    2.3ApplicationPhpPhp3.0.1*******
    2.3ApplicationPhpPhp3.0.2*******
    2.3ApplicationPhpPhp3.0.3*******
    2.3ApplicationPhpPhp3.0.4*******
    2.3ApplicationPhpPhp3.0.5*******
    2.3ApplicationPhpPhp3.0.6*******
    2.3ApplicationPhpPhp3.0.7*******
    2.3ApplicationPhpPhp3.0.8*******
    2.3ApplicationPhpPhp3.0.9*******
    2.3ApplicationPhpPhp3.0.10*******
    2.3ApplicationPhpPhp3.0.11*******
    2.3ApplicationPhpPhp3.0.12*******
    2.3ApplicationPhpPhp3.0.13*******
    2.3ApplicationPhpPhp3.0.14*******
    2.3ApplicationPhpPhp3.0.15*******
    2.3ApplicationPhpPhp3.0.16*******
    2.3ApplicationPhpPhp3.0.17*******
    2.3ApplicationPhpPhp3.0.18*******
    2.3ApplicationPhpPhp4.0beta1******
    2.3ApplicationPhpPhp4.0beta2******
    2.3ApplicationPhpPhp4.0beta3******
    2.3ApplicationPhpPhp4.0beta4******
    2.3ApplicationPhpPhp4.0beta_4_patch1******
    2.3ApplicationPhpPhp4.0.0*******
    2.3ApplicationPhpPhp4.0.1*******
    2.3ApplicationPhpPhp4.0.2*******
    2.3ApplicationPhpPhp4.0.3*******
    2.3ApplicationPhpPhp4.0.4*******
    2.3ApplicationPhpPhp4.0.5*******
    2.3ApplicationPhpPhp4.0.6*******
    2.3ApplicationPhpPhp4.0.7*******
    2.3ApplicationPhpPhp4.1.0*******
    2.3ApplicationPhpPhp4.1.1*******
    2.3ApplicationPhpPhp4.1.2*******
    2.3ApplicationPhpPhp4.2.0*******
    2.3ApplicationPhpPhp4.2.1*******
    2.3ApplicationPhpPhp4.2.2*******
    2.3ApplicationPhpPhp4.2.3*******
    2.3ApplicationPhpPhp4.3.0*******
    2.3ApplicationPhpPhp4.3.1*******
    2.3ApplicationPhpPhp4.3.2*******
    2.3ApplicationPhpPhp4.3.3*******
    2.3ApplicationPhpPhp4.3.4*******
    2.3ApplicationPhpPhp4.3.5*******
    2.3ApplicationPhpPhp4.3.6*******
    2.3ApplicationPhpPhp4.3.7*******
    2.3ApplicationPhpPhp4.3.8*******
    2.3ApplicationPhpPhp4.3.9*******
    2.3ApplicationPhpPhp4.3.10*******
    2.3ApplicationPhpPhp4.3.11*******
    2.3ApplicationPhpPhp4.4.0*******
    2.3ApplicationPhpPhp4.4.1*******
    2.3ApplicationPhpPhp4.4.2*******
    2.3ApplicationPhpPhp4.4.3*******
    2.3ApplicationPhpPhp4.4.4*******
    2.3ApplicationPhpPhp4.4.5*******
    2.3ApplicationPhpPhp4.4.6*******
    2.3ApplicationPhpPhp4.4.7*******
    2.3ApplicationPhpPhp4.4.8*******
    2.3ApplicationPhpPhp4.4.9*******
    2.3ApplicationPhpPhp5.0.0*******
    2.3ApplicationPhpPhp5.0.0beta1******
    2.3ApplicationPhpPhp5.0.0beta2******
    2.3ApplicationPhpPhp5.0.0beta3******
    2.3ApplicationPhpPhp5.0.0beta4******
    2.3ApplicationPhpPhp5.0.0rc1******
    2.3ApplicationPhpPhp5.0.0rc2******
    2.3ApplicationPhpPhp5.0.0rc3******
    2.3ApplicationPhpPhp5.0.1*******
    2.3ApplicationPhpPhp5.0.2*******
    2.3ApplicationPhpPhp5.0.3*******
    2.3ApplicationPhpPhp5.0.4*******
    2.3ApplicationPhpPhp5.0.5*******
    2.3ApplicationPhpPhp5.1.0*******
    2.3ApplicationPhpPhp5.1.1*******
    2.3ApplicationPhpPhp5.1.2*******
    2.3ApplicationPhpPhp5.1.3*******
    2.3ApplicationPhpPhp5.1.4*******
    2.3ApplicationPhpPhp5.1.5*******
    2.3ApplicationPhpPhp5.1.6*******
    2.3ApplicationPhpPhp5.2.0*******
    2.3ApplicationPhpPhp5.2.1*******
    2.3ApplicationPhpPhp5.2.2*******
    2.3ApplicationPhpPhp5.2.3*******
    2.3ApplicationPhpPhp5.2.4*******
    2.3ApplicationPhpPhp5.2.5*******
    2.3ApplicationPhpPhp5.2.6*******
    2.3ApplicationPhpPhp5.2.8*******
    2.3ApplicationPhpPhp5.2.9*******
    2.3ApplicationPhpPhp5.2.10*******
    2.3ApplicationPhpPhp5.2.11*******
    2.3ApplicationPhpPhp5.2.12*******
    2.3ApplicationPhpPhp5.2.13*******
    2.3ApplicationPhpPhp5.2.14*******
    2.3ApplicationPhpPhp5.3.0*******
    2.3ApplicationPhpPhp5.3.1*******
    2.3ApplicationPhpPhp5.3.2*******
    2.3ApplicationPhpPhp5.3.3*******
    2.3ApplicationPhpPhp5.3.4*******
    2.3ApplicationPhpPhp********5.3.5

Vulnerable Software List

VendorProductVersions
Php Php *, 1.0, 2.0, 2.0b10, 3.0, 3.0.1, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 4.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1.0, 4.1.1, 4.1.2, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1, 4.3.10, 4.3.11, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2.0, 5.2.1, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.8, 5.2.9, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4

References

NameSourceURLTags
http://bugs.php.net/bug.php?id=54247http://bugs.php.net/bug.php?id=54247CONFIRM
APPLE-SA-2011-10-12-3http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlAPPLE
FEDORA-2011-3636http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.htmlFEDORA
FEDORA-2011-3666http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.htmlFEDORA
FEDORA-2011-3614http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.htmlFEDORA
[oss-security] 20110314 CVE request: format-string vulnerability in PHP Phar extensionhttp://openwall.com/lists/oss-security/2011/03/14/13MLIST
[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extensionhttp://openwall.com/lists/oss-security/2011/03/14/14MLISTPatch
[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extensionhttp://openwall.com/lists/oss-security/2011/03/14/24MLIST
43744http://secunia.com/advisories/43744SECUNIAVendor Advisory
http://support.apple.com/kb/HT5002http://support.apple.com/kb/HT5002CONFIRM
http://svn.php.net/viewvc?view=revision&revision=309221http://svn.php.net/viewvc?view=revision&revision=309221CONFIRMPatch
DSA-2266http://www.debian.org/security/2011/dsa-2266DEBIAN
MDVSA-2011:052http://www.mandriva.com/security/advisories?name=MDVSA-2011:052MANDRIVA
MDVSA-2011:053http://www.mandriva.com/security/advisories?name=MDVSA-2011:053MANDRIVA
http://www.php.net/archive/2011.phphttp://www.php.net/archive/2011.phpCONFIRM
http://www.php.net/ChangeLog-5.phphttp://www.php.net/ChangeLog-5.phpCONFIRM
http://www.php.net/releases/5_3_6.phphttp://www.php.net/releases/5_3_6.phpCONFIRM
46854http://www.securityfocus.com/bid/46854BID
ADV-2011-0744http://www.vupen.com/english/advisories/2011/0744VUPEN
ADV-2011-0764http://www.vupen.com/english/advisories/2011/0764VUPEN
ADV-2011-0890http://www.vupen.com/english/advisories/2011/0890VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=688378https://bugzilla.redhat.com/show_bug.cgi?id=688378CONFIRM
php-pharobject-format-string(66079)https://exchange.xforce.ibmcloud.com/vulnerabilities/66079XF