First published: Mon Sep 12 2016(Updated: )
Zend/zend_alloc.c in PHP 7.x before 7.0.10, when open_basedir is enabled, mishandles huge realloc operations, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a long pathname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.10 | 7.0.10 |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 | |
PHP | =7.0.8 | |
PHP | =7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7133 has a severity level classified as medium, primarily causing denial of service due to integer overflow.
To fix CVE-2016-7133, you should upgrade PHP to version 7.0.10 or later.
CVE-2016-7133 affects PHP versions 7.0.0 through 7.0.9.
CVE-2016-7133 allows remote attackers to exploit integer overflow through crafted long pathnames.
While primarily enabling denial of service, CVE-2016-7133 could potentially allow for unspecified additional impacts.