CVE-2010-2950

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.

References

http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html

http://marc.info/?l=bugtraq&m=130331363227777&w=2

http://php-security.org/2010/05/14/mops-2010-024-php-phar_stream_flush-format-string-vulnerability/index.html

http://security-tracker.debian.org/tracker/CVE-2010-2950

http://support.apple.com/kb/HT4581

http://svn.php.net/viewvc?view=revision&revision=302565

http://www.mandriva.com/security/advisories?name=MDVSA-2010:254

http://www.php.net/archive/2010.php#id2010-12-10-1

http://www.php.net/ChangeLog-5.php

http://www.php.net/releases/5_3_4.php

https://bugzilla.redhat.com/show_bug.cgi?id=598537

Details

Source: MITRE

Published: 2010-09-28

Updated: 2011-05-04

Type: CWE-134

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
75429openSUSE Security Update : apache2-mod_php5 (openSUSE-SU-2010:0599-1)NessusSuSE Local Security Checks
high
68571Oracle Linux 5 : php53 (ELSA-2012-1047)NessusOracle Linux Local Security Checks
high
68570Oracle Linux 6 : php (ELSA-2012-1046)NessusOracle Linux Local Security Checks
high
67089CentOS 5 : php53 (CESA-2012:1047)NessusCentOS Local Security Checks
high
61358Scientific Linux Security Update : php on SL6.x i386/x86_64 (20120627)NessusScientific Linux Local Security Checks
high
61356Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20120627)NessusScientific Linux Local Security Checks
high
59938CentOS 6 : php (CESA-2012:1046)NessusCentOS Local Security Checks
high
59753RHEL 5 : php53 (RHSA-2012:1047)NessusRed Hat Local Security Checks
high
59752RHEL 6 : php (RHSA-2012:1046)NessusRed Hat Local Security Checks
high
56459GLSA-201110-06 : PHP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
53532HP System Management Homepage < 6.3 Multiple VulnerabilitiesNessusWeb Servers
critical
52754Mac OS X 10.6.x < 10.6.7 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
800796Mac OS X 10.6 < 10.6.7 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5826Mac OS X 10.6 < 10.6.7 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
51196Mandriva Linux Security Advisory : php (MDVSA-2010:254)NessusMandriva Local Security Checks
medium
51152FreeBSD : php -- multiple vulnerabilities (5353)NessusFreeBSD Local Security Checks
medium
51140PHP 5.3 < 5.3.4 Multiple VulnerabilitiesNessusCGI abuses
medium
801074PHP 5.3 < 5.3.4 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
high
5732PHP 5.3.x < 5.3.4 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
49306Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : php5 vulnerabilities (USN-989-1)NessusUbuntu Local Security Checks
high
49210openSUSE Security Update : apache2-mod_php5 (openSUSE-SU-2010:0599-1)NessusSuSE Local Security Checks
high