Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
References
Link | Resource |
---|---|
https://bugs.php.net/bug.php?id=73147 | Exploit Vendor Advisory |
http://www.php.net/ChangeLog-7.php | Release Notes Vendor Advisory |
http://www.php.net/ChangeLog-5.php | Release Notes Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/11/01/2 | Third Party Advisory |
http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f | Patch |
http://www.securityfocus.com/bid/93577 | Third Party Advisory VDB Entry |
https://www.tenable.com/security/tns-2016-19 | |
http://www.debian.org/security/2016/dsa-3698 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-01-04 12:59
Updated : 2017-11-03 18:29
NVD link : CVE-2016-9137
Mitre link : CVE-2016-9137
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
php
- php