First published: Fri Jun 17 2016(Updated: )
/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.6.23 | 5.6.23 |
PHP | <7.0.8 | 7.0.8 |
PHP | =5.6.0-alpha1 | |
PHP | =5.6.0-alpha2 | |
PHP | =5.6.0-alpha3 | |
PHP | =5.6.0-alpha4 | |
PHP | =5.6.0-alpha5 | |
PHP | =5.6.0-beta1 | |
PHP | =5.6.0-beta2 | |
PHP | =5.6.0-beta3 | |
PHP | =5.6.0-beta4 | |
PHP | =5.6.1 | |
PHP | =5.6.2 | |
PHP | =5.6.3 | |
PHP | =5.6.4 | |
PHP | =5.6.5 | |
PHP | =5.6.6 | |
PHP | =5.6.7 | |
PHP | =5.6.8 | |
PHP | =5.6.9 | |
PHP | =5.6.10 | |
PHP | =5.6.11 | |
PHP | =5.6.12 | |
PHP | =5.6.13 | |
PHP | =5.6.14 | |
PHP | =5.6.15 | |
PHP | =5.6.16 | |
PHP | =5.6.17 | |
PHP | =5.6.18 | |
PHP | =5.6.19 | |
PHP | =5.6.20 | |
PHP | =5.6.21 | |
PHP | =5.6.22 | |
PHP | =7.0.7 | |
SUSE Linux Enterprise Module for Web Scripting | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4473 is classified as a critical vulnerability allowing remote code execution.
To fix CVE-2016-4473, upgrade PHP to versions 5.6.23 or 7.0.8 or later.
CVE-2016-4473 affects PHP versions 5.6.0 to 5.6.22 and 7.0.0 to 7.0.7.
Yes, CVE-2016-4473 can be exploited remotely without user interaction.
CVE-2016-4473 involves an invalid free issue in the phar_extract_file() function, enabling arbitrary code execution.