CVE-2016-7479
Published: 11 January 2017
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
precise |
Released
(5.3.10-1ubuntu3.26)
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.21)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0 |
||
php7.0 Launchpad, Ubuntu, Debian |
upstream |
Released
(7.0.15)
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
xenial |
Released
(7.0.15-0ubuntu0.16.04.2)
|
|
yakkety |
Released
(7.0.15-0ubuntu0.16.10.2)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0 upstream: http://git.php.net/?p=php-src.git;a=commit;h=b47c49d7a00bc34d7e0f3d72732f66e904da6fa7 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
- http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
- http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
- https://www.youtube.com/watch?v=LDcaPstAuPk
- https://ubuntu.com/security/notices/USN-3196-1
- https://ubuntu.com/security/notices/USN-3211-1
- NVD
- Launchpad
- Debian