Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9138

Опубликовано: 04 янв. 2017
Источник: debian
EPSS Низкий

Описание

PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.0fixed7.0.12-1package
php5removedpackage
php5not-affectedwheezypackage

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=73147

  • https://www.openwall.com/lists/oss-security/2016/11/01/7

EPSS

Процентиль: 85%
0.02479
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.

CVSS3: 8.1
redhat
больше 8 лет назад

PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.

CVSS3: 9.8
nvd
больше 8 лет назад

PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.

CVSS3: 9.8
github
около 3 лет назад

PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.

fstec
больше 8 лет назад

Уязвимость модификации процесса __wakeup интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 85%
0.02479
Низкий