Описание
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 5.6.4+dfsg-4ubuntu2 |
esm-infra-legacy/trusty | not-affected | 5.5.9+dfsg-1ubuntu4.6 |
lucid | not-affected | 5.3.2-1ubuntu4.28 |
precise | released | 5.3.10-1ubuntu3.16 |
trusty | released | 5.5.9+dfsg-1ubuntu4.6 |
trusty/esm | not-affected | 5.5.9+dfsg-1ubuntu4.6 |
upstream | needs-triage | |
utopic | released | 5.5.12+dfsg-2ubuntu4.2 |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
Use-after-free vulnerability in the process_nested_data function in ex ...
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
Уязвимость функции process_nested_data интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
7.5 High
CVSS2