First published: Wed Jan 04 2017(Updated: )
PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.6.27 | |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 | |
PHP | =7.0.8 | |
PHP | =7.0.9 | |
PHP | =7.0.10 | |
PHP | =7.0.11 | |
PHP | =7.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9138 has a moderate severity level due to its potential for causing denial of service.
To fix CVE-2016-9138, upgrade PHP to version 5.6.28 or newer, or to any version in the 7.1 series or later.
CVE-2016-9138 affects PHP versions up to 5.6.27 and from 7.0.0 up to 7.0.12.
CVE-2016-9138 does not directly lead to remote code execution but may be exploited for denial of service and other unspecified impacts.
CVE-2016-9138 can be exploited by remote attackers through crafted serialized data during the __wakeup processing.