First published: Mon Feb 08 2016(Updated: )
A heap corruption vulnerability when parsing tar/zip/phar file with empty content. Upstream bug: <a href="https://bugs.php.net/bug.php?id=71354">https://bugs.php.net/bug.php?id=71354</a> Upstream patch: <a href="https://git.php.net/?p=php-src.git;a=commitdiff;h=13ad4d3e971807f9a58ab5933182907dc2958539">https://git.php.net/?p=php-src.git;a=commitdiff;h=13ad4d3e971807f9a58ab5933182907dc2958539</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php5 | ||
debian/php5.6 | ||
debian/php7.0 | ||
redhat/php | <5.6.18 | 5.6.18 |
redhat/php | <5.5.32 | 5.5.32 |
PHP | <7.0.3 | 7.0.3 |
SUSE Linux | =42.1 | |
PHP | <=5.5.31 | |
PHP | =5.6.0 | |
PHP | =5.6.1 | |
PHP | =5.6.2 | |
PHP | =5.6.3 | |
PHP | =5.6.4 | |
PHP | =5.6.5 | |
PHP | =5.6.6 | |
PHP | =5.6.7 | |
PHP | =5.6.8 | |
PHP | =5.6.9 | |
PHP | =5.6.10 | |
PHP | =5.6.11 | |
PHP | =5.6.12 | |
PHP | =5.6.13 | |
PHP | =5.6.14 | |
PHP | =5.6.15 | |
PHP | =5.6.16 | |
PHP | =5.6.17 | |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4342 is a vulnerability in PHP that allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted TAR, ZIP, or PHAR file.
CVE-2016-4342 affects PHP versions before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3.
CVE-2016-4342 has a severity score of 8.8 (high).
To fix CVE-2016-4342 in PHP, make sure you are using PHP version 5.5.32, 5.6.18, or 7.0.3 or later.
You can find more information about CVE-2016-4342 at the PHP website (https://www.php.net/ChangeLog-7.php#7.0.3) and through the Openwall mailing list (http://www.openwall.com/lists/oss-security/2016/04/28/2).