
CVE-2016-7413 – php: Use after free in wddx_deserialize
https://notcve.org/view.php?id=CVE-2016-7413
17 Sep 2016 — Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call. Vulnerabilidad de uso después de liberación de memoria en la función wddx_stack_destroy en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.26 y 7.x en v... • http://www.openwall.com/lists/oss-security/2016/09/15/10 • CWE-416: Use After Free •

CVE-2016-7412 – php: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
https://notcve.org/view.php?id=CVE-2016-7412
17 Sep 2016 — ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata. ext/mysqlnd/mysqlnd_wireprotocol.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no verifica que un campo BIT tenga el indicador UNSIGNED_FLAG, lo que podría permitir a servidore... • http://www.openwall.com/lists/oss-security/2016/09/15/10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2016-7414 – php: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
https://notcve.org/view.php?id=CVE-2016-7414
17 Sep 2016 — The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c. La funcionalidad de verificación de firma ZIP en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no asegura que el campo uncom... • http://www.openwall.com/lists/oss-security/2016/09/15/10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVE-2016-7416 – php: Stack based buffer overflow in msgfmt_format_message
https://notcve.org/view.php?id=CVE-2016-7416
17 Sep 2016 — ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument. ext/intl/msgformat/msgformat_format.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no restringe adecuadamente l... • http://www.openwall.com/lists/oss-security/2016/09/15/10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2016-7124 – php: bypass __wakeup() in deserialization of an unexpected object
https://notcve.org/view.php?id=CVE-2016-7124
12 Sep 2016 — ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call. ext/standard/var_unserializer.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 no maneja adecuadamente ciertos objetos no válidos, lo que permite a atacantes remotos provocar una... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-502: Deserialization of Untrusted Data •

CVE-2016-7131 – php: wddx_deserialize null dereference with invalid xml
https://notcve.org/view.php?id=CVE-2016-7131
10 Sep 2016 — ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character. ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remotos provocar una denegación de servicio ... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-476: NULL Pointer Dereference •

CVE-2016-7127 – php: imagegammacorrect allows arbitrary write access
https://notcve.org/view.php?id=CVE-2016-7127
10 Sep 2016 — The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments. La función imagetruecolortopalette en ext/gd/gd.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 no valida adecuadamente los valores de gama, lo que permite a ata... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-787: Out-of-bounds Write •

CVE-2016-7132 – php: wddx_deserialize null dereference in php_wddx_pop_element
https://notcve.org/view.php?id=CVE-2016-7132
10 Sep 2016 — ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing. ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remotos pr... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-476: NULL Pointer Dereference •

CVE-2016-7129 – php: wddx_deserialize allows illegal memory access
https://notcve.org/view.php?id=CVE-2016-7129
10 Sep 2016 — The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document. La función php_wddx_process_data en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remo... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-20: Improper Input Validation •

CVE-2016-7125 – php: Session Data Injection Vulnerability
https://notcve.org/view.php?id=CVE-2016-7125
10 Sep 2016 — ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection. ext/session/session.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 omite nombres de sesión no válidos de una manera que desencadena un análisis gramatical incorrecto, lo que permite a atacantes rem... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •