Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1153 (GCVE-0-2011-1153)
Vulnerability from cvelistv5 – Published: 2011-03-16 22:00 – Updated: 2024-08-06 22:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:27.893Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "46854",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46854"
},
{
"name": "php-pharobject-format-string(66079)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"name": "43744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43744"
},
{
"name": "FEDORA-2011-3636",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"name": "ADV-2011-0764",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"name": "FEDORA-2011-3614",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"name": "[oss-security] 20110314 CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"name": "MDVSA-2011:053",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"name": "DSA-2266",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"name": "ADV-2011-0890",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.php.net/archive/2011.php"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "FEDORA-2011-3666",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"name": "MDVSA-2011:052",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"name": "ADV-2011-0744",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5002"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-03-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "46854",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46854"
},
{
"name": "php-pharobject-format-string(66079)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"name": "43744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43744"
},
{
"name": "FEDORA-2011-3636",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"name": "ADV-2011-0764",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"name": "FEDORA-2011-3614",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"name": "[oss-security] 20110314 CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"name": "MDVSA-2011:053",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"name": "DSA-2266",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"name": "ADV-2011-0890",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.php.net/archive/2011.php"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "FEDORA-2011-3666",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"name": "MDVSA-2011:052",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"name": "ADV-2011-0744",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5002"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1153",
"datePublished": "2011-03-16T22:00:00.000Z",
"dateReserved": "2011-03-03T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:14:27.893Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2011-AVI-160
Vulnerability from certfr_avis - Published: 2011-03-22 - Updated: 2011-03-23
Plusieurs vulnérabilités sont présentes dans PHP et permettent, en particulier, à un utilisateur malveillant d'exécuter du code arbitraire.
Description
Plusieurs vulnérabilités sont présentes dans PHP :
- un argument est traité de manière incorrecte par la fonction _zip_name_locate(). Ce défaut permet de provoquer un arrêt inopiné de l'application ;
- un transtypage incorrect sur les architectures 64 bits dans l'extension Exif permet de provoquer un arrêt inopiné au moyen d'une image specialement conçue ;
- un argument de la fonction shmop_read() est traité de manière incorrecte. Cette erreur est exploitable par un utilisateur malveillant pour provoquer un arrêt inopiné ou pour lire sans droit des données en mémoire ;
- des erreurs dans le traitement des formats de chaîne par les fonctions du fichier phar_object.c permettent à un utilisateur malveillant de provoquer un déni de service ou d'exécuter du code arbitraire ;
- une erreur de signe dans une variable du programme zip_stream.c est exploitable pour provoquer une consommation de 100% du CPU ;
- une erreur de traitement des archives par la fonction stream_get_contents() est exploitable pour provoquer un arrêt inopiné de l'application ;
- dans certaines circonstances, le traitement des URL de la forme ftp:// peut servir à provoquer un déni de service ;
- des fuites de mémoire de l'extension OpenSSL permettent de provoquer un épuisement des ressources mémoire ;
- un problème dans les conversions entre calendriers peut servir à provoquer un déni de service ;
- un débordement de zone mémoire dans la fonction strval() peut servir à provoquer un déni de service ;
- une erreur dans le formattage des nombres peut servir à provoquer un déni de service.
Solution
La version 5.3.6 de PHP corrige ces vulnérabilités.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
PHP version 5.3.5 et versions 5.3.x antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePHP version 5.3.5 et versions 5.3.x ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans PHP :\n\n- un argument est trait\u00e9 de mani\u00e8re incorrecte par la fonction\n \\_zip_name_locate(). Ce d\u00e9faut permet de provoquer un arr\u00eat inopin\u00e9\n de l\u0027application\u00a0;\n- un transtypage incorrect sur les architectures 64 bits dans\n l\u0027extension Exif permet de provoquer un arr\u00eat inopin\u00e9 au moyen d\u0027une\n image specialement con\u00e7ue\u00a0;\n- un argument de la fonction shmop_read() est trait\u00e9 de mani\u00e8re\n incorrecte. Cette erreur est exploitable par un utilisateur\n malveillant pour provoquer un arr\u00eat inopin\u00e9 ou pour lire sans droit\n des donn\u00e9es en m\u00e9moire\u00a0;\n- des erreurs dans le traitement des formats de cha\u00eene par les\n fonctions du fichier phar_object.c permettent \u00e0 un utilisateur\n malveillant de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\n arbitraire\u00a0;\n- une erreur de signe dans une variable du programme zip_stream.c est\n exploitable pour provoquer une consommation de 100% du CPU\u00a0;\n- une erreur de traitement des archives par la fonction\n stream_get_contents() est exploitable pour provoquer un arr\u00eat\n inopin\u00e9 de l\u0027application\u00a0;\n- dans certaines circonstances, le traitement des URL de la forme\n ftp:// peut servir \u00e0 provoquer un d\u00e9ni de service\u00a0;\n- des fuites de m\u00e9moire de l\u0027extension OpenSSL permettent de provoquer\n un \u00e9puisement des ressources m\u00e9moire\u00a0;\n- un probl\u00e8me dans les conversions entre calendriers peut servir \u00e0\n provoquer un d\u00e9ni de service\u00a0;\n- un d\u00e9bordement de zone m\u00e9moire dans la fonction strval() peut servir\n \u00e0 provoquer un d\u00e9ni de service\u00a0;\n- une erreur dans le formattage des nombres peut servir \u00e0 provoquer un\n d\u00e9ni de service.\n\n## Solution\n\nLa version 5.3.6 de PHP corrige ces vuln\u00e9rabilit\u00e9s.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2011-1466",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1466"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2011-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1469"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-1464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
}
],
"initial_release_date": "2011-03-22T00:00:00",
"last_revision_date": "2011-03-23T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-160",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-22T00:00:00.000000"
},
{
"description": "ajout de vuln\u00e9rabilit\u00e9s et des CVE.",
"revision_date": "2011-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans PHP et permettent, en\nparticulier, \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans PHP",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonce de version de PHP du 17 mars 2011",
"url": "http://www.php.net/archive/2011.php#id2011-03-17-1"
}
]
}
CERTFR-2014-AVI-480
Vulnerability from certfr_avis - Published: 2014-11-13 - Updated: 2014-11-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPOS versions antérieures à 6.6R2 | ||
| ESET | Security | Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2 | ||
| Juniper Networks | N/A | CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6 | ||
| Juniper Networks | Junos Space | Junos Space jusqu'à la version 13.3 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2 | ||
| ESET | Security | Network and Security Manager (NSM) version 2012.2 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 6.6R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space jusqu\u0027\u00e0 la version 13.3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Network and Security Manager (NSM) version 2012.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3158",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3158"
},
{
"name": "CVE-2010-3853",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3853"
},
{
"name": "CVE-2014-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
},
{
"name": "CVE-2010-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
},
{
"name": "CVE-2012-0789",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0789"
},
{
"name": "CVE-2012-2329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2329"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2011-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2012-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0781"
},
{
"name": "CVE-2014-4827",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4827"
},
{
"name": "CVE-2013-1635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2013-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
},
{
"name": "CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2012-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0788"
},
{
"name": "CVE-2010-4755",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4755"
},
{
"name": "CVE-2013-1775",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1775"
},
{
"name": "CVE-2009-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2009-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2013-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
},
{
"name": "CVE-2013-0791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0791"
},
{
"name": "CVE-2010-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2014-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
},
{
"name": "CVE-2011-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0010"
},
{
"name": "CVE-2011-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1398"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2014-4825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4825"
},
{
"name": "CVE-2010-4707",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4707"
},
{
"name": "CVE-2012-0882",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0882"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2010-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
},
{
"name": "CVE-2010-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0426"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2012-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2311"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4830",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4830"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2014-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2532"
},
{
"name": "CVE-2014-4828",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4828"
},
{
"name": "CVE-2014-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0095"
},
{
"name": "CVE-2010-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0427"
},
{
"name": "CVE-2014-3470",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3470"
},
{
"name": "CVE-2014-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3062"
},
{
"name": "CVE-2012-0831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0831"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2012-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0057"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2010-2956",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2956"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2014-4833",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4833"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2014-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0837"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
},
{
"name": "CVE-2012-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1172"
},
{
"name": "CVE-2014-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
},
{
"name": "CVE-2010-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1163"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2010-5107",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5107"
},
{
"name": "CVE-2009-1265",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1265"
},
{
"name": "CVE-2010-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3316"
},
{
"name": "CVE-2012-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3510"
},
{
"name": "CVE-2011-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5000"
},
{
"name": "CVE-2010-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3435"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-2337",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2337"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2014-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
},
{
"name": "CVE-2014-3091",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3091"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
}
],
"initial_release_date": "2014-11-13T00:00:00",
"last_revision_date": "2014-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-480",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10661 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10657 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10657"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10658 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10658"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10660 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10660"
}
]
}
CERTA-2012-AVI-218
Vulnerability from certfr_avis - Published: 2012-04-18 - Updated: 2012-04-18
De multiples vulnérabilités ont été corrigées dans HP System Management Homepage. Leur exploitation permet, entre autres, d'exécuter du code arbitraire à distance et de réaliser des dénis de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP System Management Homepage versions antérieures à 7.0.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eHP System Management Homepage\u003c/SPAN\u003e versions ant\u00e9rieures \u00e0 7.0.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2011-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0195"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2011-3210",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3210"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2010-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
},
{
"name": "CVE-2011-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3182"
},
{
"name": "CVE-2010-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0734"
},
{
"name": "CVE-2010-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2791"
},
{
"name": "CVE-2011-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3268"
},
{
"name": "CVE-2012-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0135"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2011-3267",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3267"
},
{
"name": "CVE-2010-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4409"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2012-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1993"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-3207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3207"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-1464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
},
{
"name": "CVE-2011-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3639"
},
{
"name": "CVE-2009-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0037"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-1945",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1945"
},
{
"name": "CVE-2011-1928",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1928"
},
{
"name": "CVE-2011-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3846"
},
{
"name": "CVE-2011-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2011-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3189"
}
],
"initial_release_date": "2012-04-18T00:00:00",
"last_revision_date": "2012-04-18T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-218",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP System Management Homepage\u003c/span\u003e. Leur exploitation\npermet, entre autres, d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance et de\nr\u00e9aliser des d\u00e9nis de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP System Management Homepage",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03280632 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03280632"
}
]
}
CERTA-2011-AVI-564
Vulnerability from certfr_avis - Published: 2011-10-13 - Updated: 2011-10-13
Plusieurs vulnérabilités présentes dans Mac OS X ont été corrigées.
Description
De multiples vulnérabilités découvertes dans Mac OS X permettent à une personne malveillante d'exécuter du code arbitraire à distance avec potentiellement des privilèges élevés, de provoquer un déni de service, de contourner la politique de sécurité du système, de porter atteinte à la confidentialité et à l'intégrité des données ou encore de réaliser une injection de code indirecte.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Lion Server v10.7 et v10.7.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.7 et v10.7.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Mac OS X permettent \u00e0 une\npersonne malveillante d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec\npotentiellement des privil\u00e8ges \u00e9lev\u00e9s, de provoquer un d\u00e9ni de service,\nde contourner la politique de s\u00e9curit\u00e9 du syst\u00e8me, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou encore de r\u00e9aliser\nune injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3216"
},
{
"name": "CVE-2011-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3436"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2011-3214",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3214"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-3228",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3228"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0259"
},
{
"name": "CVE-2011-3221",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3221"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3217"
},
{
"name": "CVE-2011-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3219"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2011-0230",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0230"
},
{
"name": "CVE-2011-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0229"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2011-3222",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3222"
},
{
"name": "CVE-2011-1466",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1466"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2011-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0231"
},
{
"name": "CVE-2011-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3213"
},
{
"name": "CVE-2009-4022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4022"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2011-3218",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3218"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2011-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0249"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0250"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2011-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3227"
},
{
"name": "CVE-2011-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1469"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2011-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1910"
},
{
"name": "CVE-2011-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3220"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2010-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3614"
},
{
"name": "CVE-2011-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3224"
},
{
"name": "CVE-2011-3226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3226"
},
{
"name": "CVE-2011-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0260"
},
{
"name": "CVE-2011-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2690"
},
{
"name": "CVE-2011-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3215"
},
{
"name": "CVE-2010-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3613"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1755"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3435"
},
{
"name": "CVE-2011-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2691"
},
{
"name": "CVE-2011-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3437"
},
{
"name": "CVE-2011-0251",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0251"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3225"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2011-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2464"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2010-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0097"
},
{
"name": "CVE-2011-0707",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0707"
},
{
"name": "CVE-2011-0252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0252"
},
{
"name": "CVE-2011-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0224"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2011-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0420"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-3223",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3223"
},
{
"name": "CVE-2011-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0185"
}
],
"initial_release_date": "2011-10-13T00:00:00",
"last_revision_date": "2011-10-13T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0708 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0708"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1467 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1467"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1910 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1910"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3217 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3217"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1153 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1153"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3220 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3220"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3614 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3614"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0420 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0420"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0411 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0411"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3613 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3613"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3225 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3225"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0249 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0249"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1521 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1521"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0185 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0185"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0252 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0252"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4645 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4645"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3213 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3213"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3221 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3221"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1471 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1471"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3435 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3435"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3218 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3218"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0013 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0013"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1634 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1634"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0250 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0250"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0259 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0259"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2690 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2690"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3216 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3216"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3212 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3212"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2089 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2089"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3718 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3718"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0260 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0260"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3214 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3214"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1157 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1157"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0707 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0707"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3223 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3223"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3246 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3246"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4172 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4172"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2691 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2691"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3437 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3437"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2009-4022 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2009-4022"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0187 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0187"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3192 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3192"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1755 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1755"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-0097 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-0097"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0419 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0419"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1466 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1466"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0421 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0421"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0251 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0251"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3219 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3219"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0229 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0229"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3222 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3222"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0534 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0534"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3228 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3228"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3215 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3215"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1092 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1092"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0230 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0230"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1470 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1470"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0231 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0231"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2692 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2692"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1468 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1468"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2464 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2464"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1469 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1469"
}
],
"reference": "CERTA-2011-AVI-564",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mac OS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5002 du 12 octobre 2011",
"url": "http://docs.info.apple.com/article.html?artnum=HT5002"
}
]
}
GHSA-P2Q6-4RHC-9FHC
Vulnerability from github – Published: 2022-05-17 02:01 – Updated: 2022-05-17 02:01Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.
{
"affected": [],
"aliases": [
"CVE-2011-1153"
],
"database_specific": {
"cwe_ids": [
"CWE-134"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-03-16T22:55:00Z",
"severity": "HIGH"
},
"details": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.",
"id": "GHSA-p2q6-4rhc-9fhc",
"modified": "2022-05-17T02:01:09Z",
"published": "2022-05-17T02:01:09Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1153"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
},
{
"type": "WEB",
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43744"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5002"
},
{
"type": "WEB",
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"type": "WEB",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"type": "WEB",
"url": "http://www.php.net/archive/2011.php"
},
{
"type": "WEB",
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/46854"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0890"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2011-1153
Vulnerability from fkie_nvd - Published: 2011-03-16 22:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.php.net/bug.php?id=54247 | ||
| secalert@redhat.com | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/03/14/13 | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/03/14/14 | Patch | |
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/03/14/24 | ||
| secalert@redhat.com | http://secunia.com/advisories/43744 | Vendor Advisory | |
| secalert@redhat.com | http://support.apple.com/kb/HT5002 | ||
| secalert@redhat.com | http://svn.php.net/viewvc?view=revision&revision=309221 | Patch | |
| secalert@redhat.com | http://www.debian.org/security/2011/dsa-2266 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:053 | ||
| secalert@redhat.com | http://www.php.net/ChangeLog-5.php | ||
| secalert@redhat.com | http://www.php.net/archive/2011.php | ||
| secalert@redhat.com | http://www.php.net/releases/5_3_6.php | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/46854 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0744 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0764 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0890 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=688378 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/66079 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.php.net/bug.php?id=54247 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/03/14/13 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/03/14/14 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/03/14/24 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43744 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5002 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.php.net/viewvc?view=revision&revision=309221 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2266 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:053 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.php.net/ChangeLog-5.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.php.net/archive/2011.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.php.net/releases/5_3_6.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46854 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0744 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0764 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0890 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=688378 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/66079 |
| Vendor | Product | Version | |
|---|---|---|---|
| php | php | * | |
| php | php | 1.0 | |
| php | php | 2.0 | |
| php | php | 2.0b10 | |
| php | php | 3.0 | |
| php | php | 3.0.1 | |
| php | php | 3.0.2 | |
| php | php | 3.0.3 | |
| php | php | 3.0.4 | |
| php | php | 3.0.5 | |
| php | php | 3.0.6 | |
| php | php | 3.0.7 | |
| php | php | 3.0.8 | |
| php | php | 3.0.9 | |
| php | php | 3.0.10 | |
| php | php | 3.0.11 | |
| php | php | 3.0.12 | |
| php | php | 3.0.13 | |
| php | php | 3.0.14 | |
| php | php | 3.0.15 | |
| php | php | 3.0.16 | |
| php | php | 3.0.17 | |
| php | php | 3.0.18 | |
| php | php | 4.0 | |
| php | php | 4.0 | |
| php | php | 4.0 | |
| php | php | 4.0 | |
| php | php | 4.0 | |
| php | php | 4.0.0 | |
| php | php | 4.0.1 | |
| php | php | 4.0.2 | |
| php | php | 4.0.3 | |
| php | php | 4.0.4 | |
| php | php | 4.0.5 | |
| php | php | 4.0.6 | |
| php | php | 4.0.7 | |
| php | php | 4.1.0 | |
| php | php | 4.1.1 | |
| php | php | 4.1.2 | |
| php | php | 4.2.0 | |
| php | php | 4.2.1 | |
| php | php | 4.2.2 | |
| php | php | 4.2.3 | |
| php | php | 4.3.0 | |
| php | php | 4.3.1 | |
| php | php | 4.3.2 | |
| php | php | 4.3.3 | |
| php | php | 4.3.4 | |
| php | php | 4.3.5 | |
| php | php | 4.3.6 | |
| php | php | 4.3.7 | |
| php | php | 4.3.8 | |
| php | php | 4.3.9 | |
| php | php | 4.3.10 | |
| php | php | 4.3.11 | |
| php | php | 4.4.0 | |
| php | php | 4.4.1 | |
| php | php | 4.4.2 | |
| php | php | 4.4.3 | |
| php | php | 4.4.4 | |
| php | php | 4.4.5 | |
| php | php | 4.4.6 | |
| php | php | 4.4.7 | |
| php | php | 4.4.8 | |
| php | php | 4.4.9 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.0 | |
| php | php | 5.0.1 | |
| php | php | 5.0.2 | |
| php | php | 5.0.3 | |
| php | php | 5.0.4 | |
| php | php | 5.0.5 | |
| php | php | 5.1.0 | |
| php | php | 5.1.1 | |
| php | php | 5.1.2 | |
| php | php | 5.1.3 | |
| php | php | 5.1.4 | |
| php | php | 5.1.5 | |
| php | php | 5.1.6 | |
| php | php | 5.2.0 | |
| php | php | 5.2.1 | |
| php | php | 5.2.2 | |
| php | php | 5.2.3 | |
| php | php | 5.2.4 | |
| php | php | 5.2.5 | |
| php | php | 5.2.6 | |
| php | php | 5.2.8 | |
| php | php | 5.2.9 | |
| php | php | 5.2.10 | |
| php | php | 5.2.11 | |
| php | php | 5.2.12 | |
| php | php | 5.2.13 | |
| php | php | 5.2.14 | |
| php | php | 5.3.0 | |
| php | php | 5.3.1 | |
| php | php | 5.3.2 | |
| php | php | 5.3.3 | |
| php | php | 5.3.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "675ACEA8-3364-4ABD-BDE0-621310435AEC",
"versionEndIncluding": "5.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92647629-083F-4042-8365-4AD2EBC9C1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FF72E8D5-9F8C-4BD4-9AA4-28E23CB48A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*",
"matchCriteriaId": "83BE1120-6370-4470-8586-6581EDF3FD69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "245C601D-0FE7-47E3-8304-6FF45E9567D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "691BB8BB-329A-4640-B758-7590C99B5E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC4CCE-2774-463E-82EA-36CD442D3A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C478024C-2FCD-463F-A75E-E04660AA9DF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1851ADE5-C70C-46E0-941A-6ADF7DB5C126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69DA3BA2-AF53-4C9D-93FA-0317841595B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "67B59D6A-7EDA-4C34-81D6-C2557C85D164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AEBA40B6-8FDF-41AA-8166-F491FF7F3118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E74E2B72-A428-4BB3-B6F8-0AF5E487A807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "945FF149-3446-4905-BCA1-C397E3497B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8E446DBD-FEFA-4D22-9C9D-51F61C01E414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "3C8DE728-78E1-4F9F-BC56-CD9B10E61287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "80E31CC6-9356-4BB7-9F49-320AAF341E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3E7199-8FB7-4930-9C0A-A36A698940B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"matchCriteriaId": "AEEF2298-98E8-409F-9205-84817CEF947B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6AFC00BA-D64D-4407-AC69-FDD9FF013943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "D80F2A8B-B57F-4970-867A-55E8187C1502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "EF4E0EFE-4FF6-4E8F-8EC5-68B059FC0C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "49965B80-DC27-4864-BDF0-CBBFF16BFD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF57C14-86B6-419A-BAFF-93D01CB1E081",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC2E5F96-66D2-4F99-A74D-6A2305EE218E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2D724D09-0D45-4701-93C9-348301217C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5245F990-B4A7-4ED8-909D-B8137CE79FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5652D5B0-68E4-4239-B9B7-599AFCF4C53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F9DF9D-15E5-4387-ABE3-A7583331A928",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "11579E5C-D7CF-46EE-B015-5F4185C174E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C69CDE21-2FD4-4529-8F02-8709CF5E3D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "221B9AC4-C63C-4386-B3BD-E4BC102C6124",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "78B7BA75-2A32-4A8E-ADF8-BCB4FC48CB5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEA491B-77FD-4760-8F6F-3EBC6BD810D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB25CFBB-347C-479E-8853-F49DD6CBD7D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2937B3-D034-400E-84F5-33833CE3764D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "71AEE8B4-FCF8-483B-8D4C-2E80A02E925E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2AF1D9-33B6-4B2C-9269-426B6B720164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "84B70263-37AA-4539-A286-12038A3792C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E46E4B4-808C-4B47-81D9-EC2B02A5E57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF30D7F-353B-4496-9A89-4EF2BB279E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DD97DF34-35AB-4979-96E2-B23DC8556A79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B881352D-954E-4FC0-9E42-93D02A3F3089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A782CA26-9C38-40A8-92AE-D47B14D2FCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0892C89E-9389-4452-B7E0-981A763CD426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "635F3CB1-B042-43CC-91AB-746098018D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F32DDF-17A3-45B5-9227-833EBEBD3923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "79D5336A-14AA-483E-9CBE-A7B53120B925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3AADA875-E0EA-483A-A07E-2914FE969972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "95D48A71-B84E-4B6C-9603-B3373052E568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "981C922C-7A7D-473E-8C43-03AB62FB5B8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0CD11A-09C2-4C60-8F0C-68E55BD6EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F40E4A-E125-4099-A8B3-D42614AA9312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4933D9DD-A630-4A3D-9D13-9E182F5F6F8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de formato de cadena en phar_object.c en la extensi\u00f3n phar en PHP v5.3.5 y anteriores, permite a atacantes dependiendo del contexto, obtener informaci\u00f3n sensible de los procesos de memoria, provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria), o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de las especificaciones de cadena en el argumento del m\u00e9todo de class, anterior a una llamada zend_throw_exception_ex incorrecta."
}
],
"id": "CVE-2011-1153",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-16T22:55:04.590",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43744"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"source": "secalert@redhat.com",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"source": "secalert@redhat.com",
"url": "http://www.php.net/archive/2011.php"
},
{
"source": "secalert@redhat.com",
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/46854"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.php.net/archive/2011.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-1153
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-1153",
"description": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.",
"id": "GSD-2011-1153",
"references": [
"https://www.suse.com/security/cve/CVE-2011-1153.html",
"https://www.debian.org/security/2011/dsa-2266"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1153"
],
"details": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.",
"id": "GSD-2011-1153",
"modified": "2023-12-13T01:19:08.594009Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "MISC",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "http://bugs.php.net/bug.php?id=54247",
"refsource": "MISC",
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"name": "http://openwall.com/lists/oss-security/2011/03/14/13",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"name": "http://openwall.com/lists/oss-security/2011/03/14/14",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"name": "http://openwall.com/lists/oss-security/2011/03/14/24",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"name": "http://secunia.com/advisories/43744",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43744"
},
{
"name": "http://svn.php.net/viewvc?view=revision\u0026revision=309221",
"refsource": "MISC",
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"name": "http://www.debian.org/security/2011/dsa-2266",
"refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"name": "http://www.php.net/archive/2011.php",
"refsource": "MISC",
"url": "http://www.php.net/archive/2011.php"
},
{
"name": "http://www.php.net/releases/5_3_6.php",
"refsource": "MISC",
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"name": "http://www.securityfocus.com/bid/46854",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/46854"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0744",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0764",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0890",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688378",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.3.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1153"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.php.net/bug.php?id=54247",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.php.net/bug.php?id=54247"
},
{
"name": "http://svn.php.net/viewvc?view=revision\u0026revision=309221",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.php.net/viewvc?view=revision\u0026revision=309221"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2011/03/14/24"
},
{
"name": "43744",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43744"
},
{
"name": "46854",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/46854"
},
{
"name": "[oss-security] 20110314 CVE request: format-string vulnerability in PHP Phar extension",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2011/03/14/13"
},
{
"name": "[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/03/14/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688378",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688378"
},
{
"name": "http://www.php.net/archive/2011.php",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.php.net/archive/2011.php"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "http://www.php.net/releases/5_3_6.php",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.php.net/releases/5_3_6.php"
},
{
"name": "FEDORA-2011-3614",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html"
},
{
"name": "MDVSA-2011:052",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:052"
},
{
"name": "MDVSA-2011:053",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:053"
},
{
"name": "ADV-2011-0764",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0764"
},
{
"name": "ADV-2011-0744",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0744"
},
{
"name": "FEDORA-2011-3636",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html"
},
{
"name": "FEDORA-2011-3666",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html"
},
{
"name": "ADV-2011-0890",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0890"
},
{
"name": "DSA-2266",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2266"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "php-pharobject-format-string(66079)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66079"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-08-17T01:33Z",
"publishedDate": "2011-03-16T22:55Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.