The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1033548 | vdb entry |
https://bugs.php.net/bug.php?id=69782 | |
http://php.net/ChangeLog-5.php | |
http://www.securityfocus.com/bid/76733 | vdb entry |
http://www.debian.org/security/2015/dsa-3358 | vendor advisory |
https://security.gentoo.org/glsa/201606-10 | vendor advisory |