First published: Tue Aug 16 2016(Updated: )
A code injection vulnerability was found in php-gettext. Evaluating the plural form formula in ngettext family of calls can execute arbitrary code if number is passed unsanitized from the untrusted user. References: <a href="http://seclists.org/fulldisclosure/2016/Aug/76">http://seclists.org/fulldisclosure/2016/Aug/76</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php-php-gettext | <1.0.12 | 1.0.12 |
gettext | <1.0.12 | |
SUSE Linux | =42.1 | |
SUSE Linux | =42.2 | |
Red Hat Enterprise Linux | =5.0 | |
Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8980 has a moderate severity level due to the potential for arbitrary code execution.
To fix CVE-2015-8980, update php-gettext to version 1.0.12 or later.
The impact of CVE-2015-8980 allows an attacker to execute arbitrary code through unsanitized user input in plural form formulas.
CVE-2015-8980 affects php-gettext versions prior to 1.0.12 and specific versions of various Linux distributions.
CVE-2015-8980 allows code injection by evaluating unauthorized user input in the ngettext family of calls.