First published: Sun Aug 07 2016(Updated: )
Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.5.37 | |
PHP | >=5.6.0<5.6.23 | |
PHP | >=7.0.0<7.0.8 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5770 has a medium severity level, posing a risk of denial of service and potentially allowing unspecified impacts.
To fix CVE-2016-5770, upgrade your PHP installation to version 5.5.37 or later or 5.6.23 or later.
CVE-2016-5770 affects PHP versions prior to 5.5.37, 5.6.0 to 5.6.22, and 7.0.0 to 7.0.8.
The vulnerability in CVE-2016-5770 is caused by an integer overflow in the SplFileObject::fread function.
Yes, CVE-2016-5770 can be exploited remotely by attackers using a large integer argument to trigger denial of service.