CVE-2016-7124
Published: 11 September 2016
ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
Priority
Status
Package | Release | Status |
---|---|---|
php5
Launchpad, Ubuntu, Debian |
precise |
Released
(5.3.10-1ubuntu3.25)
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.20)
|
|
upstream |
Released
(5.6.25)
|
|
xenial |
Does not exist
|
|
Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=448c9be157f4147e121f1a2a524536c75c9c6059 upstream: http://git.php.net/?p=php-src.git;a=commit;h=639f7fde6a51c23d7c670358fbcb777ac1a143f3 |
||
php7.0
Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(7.0.10)
|
|
xenial |
Released
(7.0.8-0ubuntu0.16.04.3)
|
|
Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=2135fdef9b588a34f8805b2bbf10704e36163d5a upstream: http://git.php.net/?p=php-src.git;a=commit;h=61f2f5a0f760157f9c9d32d7d3df2be47a73e74d upstream: http://git.php.net/?p=php-src.git;a=commit;h=e0f9fbdfa61012101de7f4a8653ca5538c404a71 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |