Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7479

Опубликовано: 12 янв. 2017
Источник: debian
EPSS Низкий

Описание

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.1fixed7.1.1-1package
php7.0fixed7.0.15-1package
php5removedpackage

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=72610

  • PHP Bug: https://bugs.php.net/bug.php?id=73092

  • Fixed in 7.0.15

  • PHP 5.x/7.x: https://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0

  • PHP 7.x: https://git.php.net/?p=php-src.git;a=commit;h=b47c49d7a00bc34d7e0f3d72732f66e904da6fa7

  • The change is in 5.6+, even though the property table issue only affects

  • PHP 7, because this also prevents a wide range of other __wakeup() based

  • attacks.

EPSS

Процентиль: 81%
0.01626
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 8.1
redhat
больше 8 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 9.8
nvd
больше 8 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

CVSS3: 9.8
github
около 3 лет назад

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

fstec
больше 8 лет назад

Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 81%
0.01626
Низкий