ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
                
            References
                    | Link | Resource | 
|---|---|
| http://openwall.com/lists/oss-security/2016/07/24/2 | Mailing List Release Notes | 
| http://php.net/ChangeLog-7.php | |
| http://php.net/ChangeLog-5.php | Release Notes | 
| https://bugs.php.net/72562 | Issue Tracking | 
| http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 | Exploit Mitigation Issue Tracking | 
| http://www.securityfocus.com/bid/92097 | Third Party Advisory VDB Entry | 
| https://support.apple.com/HT207170 | |
| http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | |
| https://security.gentoo.org/glsa/201611-22 | |
| http://www.securitytracker.com/id/1036430 | |
| http://www.debian.org/security/2016/dsa-3631 | |
| http://rhn.redhat.com/errata/RHSA-2016-2750.html | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2016-07-25 07:59
Updated : 2018-01-04 18:31
NVD link : CVE-2016-6290
Mitre link : CVE-2016-6290
JSON object : View
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
Products Affected
                php
- php
 


