First published: Tue Jan 19 2016(Updated: )
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.4.44 | |
PHP | >=5.5.0<5.5.28 | |
PHP | >=5.6.0<5.6.12 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6831 is categorized as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2015-6831, update PHP to version 5.4.44 or later, 5.5.28 or later, or 5.6.12 or later.
CVE-2015-6831 affects ArrayObject, SplObjectStorage, and SplDoublyLinkedList in PHP.
Yes, CVE-2015-6831 can be exploited remotely by attackers through vulnerabilities in the unserialization process.
CVE-2015-6831 was disclosed in August 2015.