CVE-2016-10159
php: Integer overflow in phar_parse_pharfile
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
Desbordamiento de entero en la función phar_parse_pharfile en ext/phar/phar.c en PHP en versiones anteriores a 5.6.30 y 7.0.x en versiones anteriores a 7.0.15 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria o caída de aplicación) a través de una entrada de manifiesto truncado en un archivo PHAR.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2017-01-24 CVE Reserved
- 2017-01-24 CVE Published
- 2023-12-28 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95774 | Third Party Advisory | |
http://www.securitytracker.com/id/1037659 | Third Party Advisory | |
https://bugs.php.net/bug.php?id=73764 | Issue Tracking | |
https://security.netapp.com/advisory/ntap-20180112-0001 | Third Party Advisory | |
https://www.tenable.com/security/tns-2017-04 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 | 2022-08-29 |
URL | Date | SRC |
---|---|---|
http://php.net/ChangeLog-5.php | 2022-08-29 | |
http://php.net/ChangeLog-7.php | 2022-08-29 | |
http://www.debian.org/security/2017/dsa-3783 | 2022-08-29 | |
https://access.redhat.com/errata/RHSA-2018:1296 | 2022-08-29 | |
https://security.gentoo.org/glsa/201702-29 | 2022-08-29 | |
https://access.redhat.com/security/cve/CVE-2016-10159 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1419020 | 2018-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | <= 5.6.29 Search vendor "Php" for product "Php" and version " <= 5.6.29" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.0.0 < 7.0.15 Search vendor "Php" for product "Php" and version " >= 7.0.0 < 7.0.15" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 7.1.0 Search vendor "Php" for product "Php" and version "7.1.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|