First published: Thu Jan 19 2017(Updated: )
Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.6.30 | 5.6.30 |
redhat/php | <7.0.15 | 7.0.15 |
redhat/php | <7.1.1 | 7.1.1 |
PHP | <7.0.15 | 7.0.15 |
PHP | >=5.6.0<5.6.30 | |
PHP | >=7.0.0<7.0.15 | |
PHP | >=7.1.0<7.1.1 | |
IBM Data ONTAP | ||
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10160 is classified as a high severity vulnerability that can lead to denial of service or potentially arbitrary code execution.
To fix CVE-2016-10160, upgrade your PHP version to 5.6.30, 7.0.15, or 7.1.1 as recommended.
CVE-2016-10160 affects PHP versions before 5.6.30 and 7.0.x before 7.0.15.
Yes, CVE-2016-10160 can be exploited remotely using a crafted PHAR archive.
Systems running vulnerable versions of PHP, such as Debian and Red Hat distributions, are impacted by CVE-2016-10160.