The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.
References
Link | Resource |
---|---|
http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 | Third Party Advisory VDB Entry |
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf | Exploit Technical Description Third Party Advisory |
http://php.net/ChangeLog-7.php | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/95152 | Third Party Advisory VDB Entry |
https://bugs.php.net/bug.php?id=73257 | Issue Tracking Patch Vendor Advisory |
https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20180112-0001/ | Third Party Advisory |
https://www.youtube.com/watch?v=LDcaPstAuPk | Broken Link Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: checkpoint
Published: 2017-01-11T06:45:00
Updated: 2018-01-13T10:57:01
Reserved: 2016-09-09T00:00:00
Link: CVE-2016-7480
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-01-11T07:59:00.143
Modified: 2022-07-20T16:47:04.810
Link: CVE-2016-7480
JSON object: View
Redhat Information
No data.
CWE