Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7480

Опубликовано: 11 янв. 2017
Источник: debian

Описание

The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.0fixed7.0.12-1package

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=73257

  • Fixed in 7.0.12

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.

CVSS3: 8.1
redhat
больше 8 лет назад

The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.

CVSS3: 9.8
nvd
больше 8 лет назад

The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.

CVSS3: 9.8
github
около 3 лет назад

The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.

fstec
больше 8 лет назад

Уязвимость реализации службы SplObjectStorage в ext/spl/spl_observer.c интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код