The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2015-1187.html | vendor-advisory x_refsource_REDHAT |
| http://www.securitytracker.com/id/1032709 | vdb-entry x_refsource_SECTRACK |
| http://rhn.redhat.com/errata/RHSA-2015-1186.html | vendor-advisory x_refsource_REDHAT |
| http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | x_refsource_CONFIRM |
| http://php.net/ChangeLog-5.php | x_refsource_CONFIRM |
| https://bugs.php.net/bug.php?id=69152 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2015/06/16/12 | mailing-list x_refsource_MLIST |
| http://rhn.redhat.com/errata/RHSA-2015-1135.html | vendor-advisory x_refsource_REDHAT |
| http://www.securityfocus.com/bid/75252 | vdb-entry x_refsource_BID |
| http://rhn.redhat.com/errata/RHSA-2015-1218.html | vendor-advisory x_refsource_REDHAT |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2015-1187.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://www.securitytracker.com/id/1032709 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://rhn.redhat.com/errata/RHSA-2015-1186.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | x_refsource_CONFIRM x_transferred |
| http://php.net/ChangeLog-5.php | x_refsource_CONFIRM x_transferred |
| https://bugs.php.net/bug.php?id=69152 | x_refsource_CONFIRM x_transferred |
| http://www.openwall.com/lists/oss-security/2015/06/16/12 | mailing-list x_refsource_MLIST x_transferred |
| http://rhn.redhat.com/errata/RHSA-2015-1135.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://www.securityfocus.com/bid/75252 | vdb-entry x_refsource_BID x_transferred |
| http://rhn.redhat.com/errata/RHSA-2015-1218.html | vendor-advisory x_refsource_REDHAT x_transferred |
The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.0 | 9.8 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Primary | 2.0 | 10.0 | HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |