Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7479

Опубликовано: 12 янв. 2017
Источник: debian
EPSS Средний

Описание

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.1fixed7.1.1-1package
php7.0fixed7.0.15-1package
php5removedpackage

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=72610

  • PHP Bug: https://bugs.php.net/bug.php?id=73092

  • Fixed in 7.0.15

  • PHP 5.x/7.x: https://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0

  • PHP 7.x: https://git.php.net/?p=php-src.git;a=commit;h=b47c49d7a00bc34d7e0f3d72732f66e904da6fa7

  • The change is in 5.6+, even though the property table issue only affects

  • PHP 7, because this also prevents a wide range of other __wakeup() based

  • attacks.

EPSS

Процентиль: 95%
0.18858
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 8.1
redhat
почти 9 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 9.8
nvd
почти 9 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 9.8
github
больше 3 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

fstec
почти 9 лет назад

Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.18858
Средний