Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e | |
http://www.securitytracker.com/id/1034543 | vdb entry |
http://php.net/ChangeLog-7.php | vendor advisory |
https://bugs.php.net/bug.php?id=71105 | exploit |