Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-6836

Опубликовано: 29 авг. 2015
Источник: redhat
CVSS2: 5.1

Описание

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

A flaw was discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpWill not fix
Red Hat Enterprise Linux 7phpWill not fix
Red Hat Software Collectionsphp54-phpWill not fix
Red Hat Software Collectionsphp55-phpWill not fix
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUSrh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-php56-phpFixedRHSA-2016:045715.03.2016
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php56-phpFixedRHSA-2016:045715.03.2016

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-843
https://bugzilla.redhat.com/show_bug.cgi?id=1260683php: SOAP serialize_function_call() type confusion

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 10 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

CVSS3: 7.3
nvd
почти 10 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

CVSS3: 7.3
debian
почти 10 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...

CVSS3: 7.3
github
больше 3 лет назад

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

fstec
почти 10 лет назад

Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код

5.1 Medium

CVSS2