CVE-2015-8617

critical

Description

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

References

https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e

http://www.securitytracker.com/id/1034543

http://php.net/ChangeLog-7.php

Details

Source: Mitre, NVD

Published: 2016-01-19

Updated: 2017-09-10

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical