php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Link | Tags |
---|---|
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor advisory |
http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 | |
https://bugs.php.net/bug.php?id=72434 | exploit vendor advisory |
http://php.net/ChangeLog-5.php | patch release notes |
http://www.openwall.com/lists/oss-security/2016/06/23/4 | mailing list release notes |
http://www.debian.org/security/2016/dsa-3618 | vendor advisory |
http://php.net/ChangeLog-7.php | patch release notes |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 | |
https://support.apple.com/HT207170 | |
http://www.securityfocus.com/bid/91397 | vdb entry |