Описание
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 5.6.11+dfsg-1ubuntu3 |
esm-infra-legacy/trusty | released | 5.5.9+dfsg-1ubuntu4.13 |
precise | released | 5.3.10-1ubuntu3.20 |
trusty | released | 5.5.9+dfsg-1ubuntu4.13 |
trusty/esm | released | 5.5.9+dfsg-1ubuntu4.13 |
upstream | released | 5.5.29,5.6.13 |
vivid | released | 5.6.4+dfsg-4ubuntu6.3 |
Показывать по
7.5 High
CVSS2
7.3 High
CVSS3
Связанные уязвимости
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
7.5 High
CVSS2
7.3 High
CVSS3