Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9137

Опубликовано: 04 янв. 2017
Источник: debian
EPSS Низкий

Описание

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.0fixed7.0.12-1package
php5removedpackage
php5not-affectedwheezypackage

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=73147

  • https://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f

  • Fixed in 7.0.12, 5.6.27

  • https://www.openwall.com/lists/oss-security/2016/10/18/1

EPSS

Процентиль: 75%
0.00889
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

CVSS3: 8.1
redhat
почти 9 лет назад

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

CVSS3: 9.8
nvd
больше 8 лет назад

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

CVSS3: 9.8
github
больше 3 лет назад

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

fstec
больше 8 лет назад

Уязвимость реализации службы CURLFile в ext/curl/curl_file.c интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 75%
0.00889
Низкий