Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-6831

Опубликовано: 19 янв. 2016
Источник: debian
EPSS Низкий

Описание

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.6.12+dfsg-1package

Примечания

  • https://bugs.php.net/bug.php?id=70169

  • https://bugs.php.net/bug.php?id=70168

  • https://bugs.php.net/bug.php?id=70166

  • https://bugs.php.net/bug.php?id=70155

  • https://www.openwall.com/lists/oss-security/2015/08/19/3

  • Fixed upstream in 5.4.44 and 5.6.12

EPSS

Процентиль: 78%
0.01156
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 10 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

redhat
больше 10 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

CVSS3: 7.3
nvd
почти 10 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

CVSS3: 7.3
github
больше 3 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

fstec
почти 10 лет назад

Уязвимости интерпретатора PHP, позволяющие нарушителю выполнить произвольный код

EPSS

Процентиль: 78%
0.01156
Низкий