Vulnerability Description
/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.6.0 |
| Suse | Linux Enterprise Module For Web Scripting | 12 |
| Suse | Linux Enterprise Software Development Kit | 12 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2750.htmlThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/98999Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1347772ExploitIssue TrackingPatch
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2750.htmlThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/98999Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1347772ExploitIssue TrackingPatch
FAQ
What is CVE-2016-4473?
CVE-2016-4473 is a vulnerability with a CVSS score of 9.8 (CRITICAL). /ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
How severe is CVE-2016-4473?
CVE-2016-4473 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-4473?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Suse Linux Enterprise Module For Web Scripting, Suse Linux Enterprise Software Development Kit.