CVE-2015-6837
Published: 9 September 2015
The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
Notes
Author | Note |
---|---|
sbeattie | DoS only? |
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
precise |
Released
(5.3.10-1ubuntu3.20)
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.13)
|
|
vivid |
Released
(5.6.4+dfsg-4ubuntu6.3)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=1744be2d17befc69bf00033993f4081852a747d6 |