9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.487 Medium
EPSS
Percentile
97.5%
Severity: High
Date : 2017-01-19
CVE-ID : CVE-2016-9935 CVE-2016-9936 CVE-2017-5340
Package : php
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-105
The package php before version 7.1.1-0 is vulnerable to multiple issues
including arbitrary code execution and denial of service.
Upgrade to 7.1.1-0.
The problems have been fixed upstream in version 7.1.1.
None.
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before
5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial
of service (out-of-bounds read and memory corruption) or possibly have
unspecified other impact via an empty boolean element in a wddxPacket
XML document.
The unserialize implementation in ext/standard/var.c in PHP 7.x before
7.0.14 allows remote attackers to cause a denial of service (use-after-
free) or possibly execute arbitrary code via crafted serialized data.
It was found that PHP uses uninitialized memory during calls to
unserialize()
. The payload supplied to unserialize()
may control
this uninitialized memory region and thus may be used to trick PHP into
operating on faked objects and calling attacker controlled destructor
function pointers, effectively allowing arbitrary code execution via
specially crafted serialized data.
A remote attacker is able to use specially crafted input to perform a
denial of service attack or execute arbitrary code on the affected
host.
http://www.openwall.com/lists/oss-security/2016/12/12/2
https://bugs.php.net/bug.php?id=73631
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
http://seclists.org/oss-sec/2016/q4/658
https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
https://bugs.php.net/bug.php?id=72978
https://bugs.php.net/bug.php?id=73832
https://security.archlinux.org/CVE-2016-9935
https://security.archlinux.org/CVE-2016-9936
https://security.archlinux.org/CVE-2017-5340
seclists.org/oss-sec/2016/q4/658
www.openwall.com/lists/oss-security/2016/12/12/2
bugs.php.net/bug.php?id=72978
bugs.php.net/bug.php?id=73631
bugs.php.net/bug.php?id=73832
github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
security.archlinux.org/AVG-105
security.archlinux.org/CVE-2016-9935
security.archlinux.org/CVE-2016-9936
security.archlinux.org/CVE-2017-5340
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.487 Medium
EPSS
Percentile
97.5%