Vulnerability Description
spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | < 5.5.37 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.2 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=PatchThird Party Advisory
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.htmlBroken LinkMailing List
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.htmlMailing ListThird Party Advisory
- http://php.net/ChangeLog-5.phpPatchRelease NotesVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2750.htmlThird Party Advisory
- http://www.debian.org/security/2016/dsa-3618Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/06/23/4Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/91401Third Party AdvisoryVDB Entry
- https://bugs.php.net/bug.php?id=72433ExploitIssue TrackingVendor Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-cThird Party Advisory
- https://support.apple.com/HT207170Third Party Advisory
- http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=PatchThird Party Advisory
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.htmlBroken LinkMailing List
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2016-5771?
CVE-2016-5771 is a vulnerability with a CVSS score of 9.8 (CRITICAL). spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute ...
How severe is CVE-2016-5771?
CVE-2016-5771 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-5771?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Opensuse Leap, Opensuse Opensuse, Debian Debian Linux.