First published: Sun Aug 07 2016(Updated: )
spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.5.37 | |
PHP | >=5.6.0<5.6.23 | |
PHP | >=7.0.0<7.0.8 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5771 is considered critical due to the potential for remote code execution and denial of service.
To fix CVE-2016-5771, upgrade to PHP version 5.5.37, 5.6.23 or later, or apply the relevant patches to affected software.
CVE-2016-5771 affects PHP versions prior to 5.5.37 and versions between 5.6.0 and 5.6.23, as well as certain 7.0.x versions before 7.0.8.
Yes, CVE-2016-5771 can be exploited remotely by attackers to execute arbitrary code via crafted serialized data.
The potential impacts of CVE-2016-5771 include arbitrary code execution and application crashes due to use-after-free vulnerabilities.