Описание
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 5.6.11+dfsg-1ubuntu3 |
esm-infra-legacy/trusty | not-affected | 5.5.9+dfsg-1ubuntu4.13 |
precise | released | 5.3.10-1ubuntu3.20 |
trusty | released | 5.5.9+dfsg-1ubuntu4.13 |
trusty/esm | not-affected | 5.5.9+dfsg-1ubuntu4.13 |
upstream | released | 5.6.12+dfsg-1 |
vivid | released | 5.6.4+dfsg-4ubuntu6.3 |
Показывать по
EPSS
7.5 High
CVSS2
7.3 High
CVSS3
Связанные уязвимости
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Use-after-free vulnerability in the SPL unserialize implementation in ...
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2
7.3 High
CVSS3