First published: Fri Dec 11 2015(Updated: )
The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.5.29 | |
PHP | =5.6.1 | |
PHP | =5.6.2 | |
PHP | =5.6.3 | |
PHP | =5.6.4 | |
PHP | =5.6.5 | |
PHP | =5.6.6 | |
PHP | =5.6.7 | |
PHP | =5.6.8 | |
PHP | =5.6.9 | |
PHP | =5.6.10 | |
PHP | =5.6.11 | |
PHP | =5.6.12 | |
PHP | =5.6.13 | |
macOS Yosemite | <=10.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7803 is classified as a denial of service vulnerability that can cause an application crash.
To fix CVE-2015-7803, upgrade PHP to version 5.5.30 or later, or to 5.6.14 or later.
CVE-2015-7803 affects PHP versions prior to 5.5.30 and 5.6.x prior to 5.6.14.
CVE-2015-7803 involves a remote attacker exploiting a crafted .phar file to trigger a NULL pointer dereference.
Yes, CVE-2015-7803 can impact systems running macOS that use the affected versions of PHP.