First published: Thu Jan 19 2017(Updated: )
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.6.30 | 5.6.30 |
redhat/php | <7.0.15 | 7.0.15 |
redhat/php | <7.1.1 | 7.1.1 |
PHP | <7.0.15 | 7.0.15 |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 | |
PHP | =7.0.8 | |
PHP | =7.0.9 | |
PHP | =7.0.10 | |
PHP | =7.0.11 | |
PHP | =7.0.12 | |
PHP | =7.0.13 | |
PHP | =7.0.14 | |
PHP | =7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10162 has a severity rating that can lead to a denial of service due to a NULL pointer dereference.
To remediate CVE-2016-10162, upgrade to PHP version 7.0.15 or 7.1.1 or later.
CVE-2016-10162 affects PHP versions prior to 7.0.15 and 7.1.1.
CVE-2016-10162 allows remote attackers to cause denial of service through a crafted wddxPacket XML document.
While direct exploitation details are not widely reported, it is advisable to patch the vulnerability due to its denial of service potential.