Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-6831

Опубликовано: 19 янв. 2016
Источник: debian
EPSS Низкий

Описание

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.6.12+dfsg-1package

Примечания

  • https://bugs.php.net/bug.php?id=70169

  • https://bugs.php.net/bug.php?id=70168

  • https://bugs.php.net/bug.php?id=70166

  • https://bugs.php.net/bug.php?id=70155

  • https://www.openwall.com/lists/oss-security/2015/08/19/3

  • Fixed upstream in 5.4.44 and 5.6.12

EPSS

Процентиль: 78%
0.01208
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 9 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

redhat
около 10 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

CVSS3: 7.3
nvd
больше 9 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

CVSS3: 7.3
github
больше 3 лет назад

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.

fstec
больше 9 лет назад

Уязвимости интерпретатора PHP, позволяющие нарушителю выполнить произвольный код

EPSS

Процентиль: 78%
0.01208
Низкий