ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.php.net/ChangeLog-7.php | release notes |
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 | issue tracking patch |
https://security.gentoo.org/glsa/201611-22 | vendor advisory |
http://www.securitytracker.com/id/1036836 | vdb entry |
http://www.openwall.com/lists/oss-security/2016/09/15/10 | mailing list |
https://access.redhat.com/errata/RHSA-2018:1296 | vendor advisory |
http://www.securityfocus.com/bid/93007 | vdb entry |
https://bugs.php.net/bug.php?id=73029 | issue tracking exploit |
http://www.php.net/ChangeLog-5.php | release notes |
https://www.tenable.com/security/tns-2016-19 |