Описание
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
php7.1 | fixed | 7.1.1-1 | package | |
php7.0 | fixed | 7.0.15-1 | package | |
php5 | removed | package |
Примечания
PHP Bug: https://bugs.php.net/bug.php?id=72610
PHP Bug: https://bugs.php.net/bug.php?id=73092
Fixed in 7.0.15
PHP 5.x/7.x: https://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0
PHP 7.x: https://git.php.net/?p=php-src.git;a=commit;h=b47c49d7a00bc34d7e0f3d72732f66e904da6fa7
The change is in 5.6+, even though the property table issue only affects
PHP 7, because this also prevents a wide range of other __wakeup() based
attacks.
EPSS
Связанные уязвимости
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS