Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9935

Опубликовано: 04 янв. 2017
Источник: debian
EPSS Низкий

Описание

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.0fixed7.0.14-1package
php5removedpackage

Примечания

  • Fixed in PHP 5.6.29 and 7.0.14

  • PHP Bug: https://bugs.php.net/bug.php?id=73631

  • Fixed by: https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0

  • https://www.openwall.com/lists/oss-security/2016/12/12/2

EPSS

Процентиль: 84%
0.02323
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

CVSS3: 4.2
redhat
больше 8 лет назад

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

CVSS3: 9.8
nvd
больше 8 лет назад

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

CVSS3: 9.8
github
больше 3 лет назад

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

fstec
больше 8 лет назад

Уязвимость функции php_wddx_push_element интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 84%
0.02323
Низкий