CVE-2016-10159
Published: 24 January 2017
Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
precise |
Released
(5.3.10-1ubuntu3.26)
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.21)
|
|
upstream |
Released
(5.6.30)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
Patches: upstream: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 |
||
php7.0 Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(7.0.15)
|
|
xenial |
Released
(7.0.15-0ubuntu0.16.04.2)
|
|
yakkety |
Released
(7.0.15-0ubuntu0.16.10.2)
|
|
Patches: upstream: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |