PHP is vulnerable to use after free vulnerability. The vulnerability exists in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP. Remote attackers could cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
CPE | Name | Operator | Version |
---|---|---|---|
rh-php70-php | eq | 7.0.10__2.el7 | |
rh-php70-php | eq | 7.0.10__2.el6 | |
rh-php70-php | eq | 7.0.10__2.el7 | |
rh-php70-php | eq | 7.0.10__2.el6 |
www.openwall.com/lists/oss-security/2016/09/15/10
www.php.net/ChangeLog-5.php
www.php.net/ChangeLog-7.php
www.securityfocus.com/bid/93006
www.securitytracker.com/id/1036836
access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.1_release_notes/chap-rhscl#sect-RHSCL-Changes-php
access.redhat.com/errata/RHSA-2018:1296
access.redhat.com/security/updates/classification/#moderate
bugs.php.net/bug.php?id=72860
github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
security.gentoo.org/glsa/201611-22
www.tenable.com/security/tns-2016-19