ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
References
Link | Resource |
---|---|
https://bugs.php.net/bug.php?id=73052 | Exploit Issue Tracking |
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 | Issue Tracking Patch |
http://www.php.net/ChangeLog-5.php | Release Notes |
http://www.openwall.com/lists/oss-security/2016/09/15/10 | Mailing List |
http://www.securityfocus.com/bid/93009 | |
https://security.gentoo.org/glsa/201611-22 | |
http://www.securitytracker.com/id/1036836 |
Configurations
Information
Published : 2016-09-17 14:59
Updated : 2017-07-29 18:29
NVD link : CVE-2016-7411
Mitre link : CVE-2016-7411
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
php
- php