7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.039 Low
EPSS
Percentile
92.0%
Severity: Critical
Date : 2016-11-18
CVE-ID : CVE-2016-6911 CVE-2016-7568 CVE-2016-8670 CVE-2016-9138
Package : php
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package php before version 7.0.13-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 7.0.13-1.
The problems have been fixed upstream in version 7.0.13.
None.
It was found that the dynamicGetbuf() function doesn’t check for out-
of-bounds read and returns a wrong return code, leading to denial of
service.
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in gd. A specially crafted image, when converted to webp, could
cause the application to crash or potentially execute arbitrary code.
A stack based buffer overflow was found in the dynamicGetbuf function
when passing negative rlen
as size to memcpy().
An use after free vulnerability was found in unserialize() via
DateInterval::__wakeup(), leading to arbitrary code execution.
A remote attacker is able to execute arbitrary code or crash the
application via various vectors.
http://seclists.org/oss-sec/2016/q3/639
https://bugs.php.net/bug.php?id=73003
https://github.com/libgd/libgd/issues/308
https://bugs.php.net/bug.php?id=73280
http://www.openwall.com/lists/oss-security/2016/10/15/6
https://bugs.php.net/bug.php?id=73147
http://seclists.org/oss-sec/2016/q4/296
https://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
https://access.redhat.com/security/cve/CVE-2016-6911
https://access.redhat.com/security/cve/CVE-2016-7568
https://access.redhat.com/security/cve/CVE-2016-8670
https://access.redhat.com/security/cve/CVE-2016-9138
seclists.org/oss-sec/2016/q3/639
seclists.org/oss-sec/2016/q4/296
www.openwall.com/lists/oss-security/2016/10/15/6
access.redhat.com/security/cve/CVE-2016-6911
access.redhat.com/security/cve/CVE-2016-7568
access.redhat.com/security/cve/CVE-2016-8670
access.redhat.com/security/cve/CVE-2016-9138
bugs.php.net/bug.php?id=73003
bugs.php.net/bug.php?id=73147
bugs.php.net/bug.php?id=73280
git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
github.com/libgd/libgd/issues/308
wiki.archlinux.org/index.php/CVE
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.039 Low
EPSS
Percentile
92.0%