First published: Mon Sep 12 2016(Updated: )
The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.10 | 7.0.10 |
PHP | <=5.6.24 | |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 | |
PHP | =7.0.8 | |
PHP | =7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7128 has been classified as a high severity vulnerability due to its potential to leak sensitive information.
To fix CVE-2016-7128, upgrade PHP to version 5.6.25 or later, or to version 7.0.10 or later.
CVE-2016-7128 affects PHP versions prior to 5.6.25 and 7.0.10, which are commonly used in web servers and applications.
An attacker can exploit CVE-2016-7128 to read sensitive information from the process memory through a specially crafted TIFF image.
Yes, CVE-2016-7128 is a remote vulnerability that allows attackers to exploit it without physical access to the affected system.