Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
References
Link | Resource |
---|---|
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0e6fe3a4c96be2d3e88389a5776f878021b4c59f | |
http://www.debian.org/security/2016/dsa-3698 | |
http://www.openwall.com/lists/oss-security/2016/11/01/2 | Third Party Advisory |
http://www.php.net/ChangeLog-5.php | Release Notes Vendor Advisory |
http://www.php.net/ChangeLog-7.php | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/93577 | Third Party Advisory VDB Entry |
https://bugs.php.net/bug.php?id=73147 | Exploit Vendor Advisory |
https://www.tenable.com/security/tns-2016-19 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-01-04T20:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2016-11-01T00:00:00
Link: CVE-2016-9137
JSON object: View
NVD Information
Status : Modified
Published: 2017-01-04T20:59:00.387
Modified: 2023-11-07T02:36:45.653
Link: CVE-2016-9137
JSON object: View
Redhat Information
No data.
CWE