ID CVE-2015-6831
Summary Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
References
Vulnerable Configurations
  • cpe:2.3:a:php:php:5.4.43:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.4.43:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.26:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.26:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.5.27:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.5.27:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 04-11-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
rpms
  • rh-php56-php-0:5.6.5-8.el6
  • rh-php56-php-0:5.6.5-8.el7
  • rh-php56-php-bcmath-0:5.6.5-8.el6
  • rh-php56-php-bcmath-0:5.6.5-8.el7
  • rh-php56-php-cli-0:5.6.5-8.el6
  • rh-php56-php-cli-0:5.6.5-8.el7
  • rh-php56-php-common-0:5.6.5-8.el6
  • rh-php56-php-common-0:5.6.5-8.el7
  • rh-php56-php-dba-0:5.6.5-8.el6
  • rh-php56-php-dba-0:5.6.5-8.el7
  • rh-php56-php-dbg-0:5.6.5-8.el6
  • rh-php56-php-dbg-0:5.6.5-8.el7
  • rh-php56-php-debuginfo-0:5.6.5-8.el6
  • rh-php56-php-debuginfo-0:5.6.5-8.el7
  • rh-php56-php-devel-0:5.6.5-8.el6
  • rh-php56-php-devel-0:5.6.5-8.el7
  • rh-php56-php-embedded-0:5.6.5-8.el6
  • rh-php56-php-embedded-0:5.6.5-8.el7
  • rh-php56-php-enchant-0:5.6.5-8.el6
  • rh-php56-php-enchant-0:5.6.5-8.el7
  • rh-php56-php-fpm-0:5.6.5-8.el6
  • rh-php56-php-fpm-0:5.6.5-8.el7
  • rh-php56-php-gd-0:5.6.5-8.el6
  • rh-php56-php-gd-0:5.6.5-8.el7
  • rh-php56-php-gmp-0:5.6.5-8.el6
  • rh-php56-php-gmp-0:5.6.5-8.el7
  • rh-php56-php-imap-0:5.6.5-8.el6
  • rh-php56-php-intl-0:5.6.5-8.el6
  • rh-php56-php-intl-0:5.6.5-8.el7
  • rh-php56-php-ldap-0:5.6.5-8.el6
  • rh-php56-php-ldap-0:5.6.5-8.el7
  • rh-php56-php-mbstring-0:5.6.5-8.el6
  • rh-php56-php-mbstring-0:5.6.5-8.el7
  • rh-php56-php-mysqlnd-0:5.6.5-8.el6
  • rh-php56-php-mysqlnd-0:5.6.5-8.el7
  • rh-php56-php-odbc-0:5.6.5-8.el6
  • rh-php56-php-odbc-0:5.6.5-8.el7
  • rh-php56-php-opcache-0:5.6.5-8.el6
  • rh-php56-php-opcache-0:5.6.5-8.el7
  • rh-php56-php-pdo-0:5.6.5-8.el6
  • rh-php56-php-pdo-0:5.6.5-8.el7
  • rh-php56-php-pgsql-0:5.6.5-8.el6
  • rh-php56-php-pgsql-0:5.6.5-8.el7
  • rh-php56-php-process-0:5.6.5-8.el6
  • rh-php56-php-process-0:5.6.5-8.el7
  • rh-php56-php-pspell-0:5.6.5-8.el6
  • rh-php56-php-pspell-0:5.6.5-8.el7
  • rh-php56-php-recode-0:5.6.5-8.el6
  • rh-php56-php-recode-0:5.6.5-8.el7
  • rh-php56-php-snmp-0:5.6.5-8.el6
  • rh-php56-php-snmp-0:5.6.5-8.el7
  • rh-php56-php-soap-0:5.6.5-8.el6
  • rh-php56-php-soap-0:5.6.5-8.el7
  • rh-php56-php-tidy-0:5.6.5-8.el6
  • rh-php56-php-xml-0:5.6.5-8.el6
  • rh-php56-php-xml-0:5.6.5-8.el7
  • rh-php56-php-xmlrpc-0:5.6.5-8.el6
  • rh-php56-php-xmlrpc-0:5.6.5-8.el7
refmap via4
bid 76737
confirm
debian DSA-3344
gentoo GLSA-201606-10
mlist [oss-security] 20150819 CVE Request: more php unserializing issues
Last major update 04-11-2017 - 01:29
Published 19-01-2016 - 05:59
Last modified 04-11-2017 - 01:29
Back to Top