Description
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-341-1 | php5 security update |
EUVD |
EUVD-2015-6768 | Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field. |
Ubuntu USN |
USN-2758-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T07:36:33.365Z
Reserved: 2015-09-08T00:00:00.000Z
Link: CVE-2015-6832
No data.
Status : Deferred
Published: 2016-01-19T05:59:03.607
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-6832
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN