Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3515

Опубликовано: 09 июл. 2014
Источник: redhat
CVSS2: 5.1
EPSS Средний

Описание

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes' unserialize() method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application.

Отчет

This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53FixedRHSA-2014:101206.08.2014
Red Hat Enterprise Linux 6phpFixedRHSA-2014:101206.08.2014
Red Hat Enterprise Linux 7phpFixedRHSA-2014:101306.08.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2014:176630.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSphp54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSphp55-phpFixedRHSA-2014:176630.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSphp54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSphp55-phpFixedRHSA-2014:176630.10.2014

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-843
https://bugzilla.redhat.com/show_bug.cgi?id=1112154php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw

EPSS

Процентиль: 98%
0.60788
Средний

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

nvd
почти 11 лет назад

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

debian
почти 11 лет назад

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorre ...

github
около 3 лет назад

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

fstec
около 11 лет назад

Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 98%
0.60788
Средний

5.1 Medium

CVSS2