Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-6836

Опубликовано: 29 авг. 2015
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

A flaw was discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpWill not fix
Red Hat Enterprise Linux 7phpWill not fix
Red Hat Software Collectionsphp54-phpWill not fix
Red Hat Software Collectionsphp55-phpWill not fix
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUSrh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php56-phpFixedRHSA-2016:045715.03.2016

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-843
https://bugzilla.redhat.com/show_bug.cgi?id=1260683php: SOAP serialize_function_call() type confusion

EPSS

Процентиль: 83%
0.02069
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 9 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

CVSS3: 7.3
nvd
больше 9 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

CVSS3: 7.3
debian
больше 9 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...

CVSS3: 7.3
github
больше 3 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

fstec
больше 9 лет назад

Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 83%
0.02069
Низкий

5.1 Medium

CVSS2