Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-341-1 | php5 security update |
EUVD |
EUVD-2015-6768 | Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field. |
Ubuntu USN |
USN-2758-1 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T07:36:33.365Z
Reserved: 2015-09-08T00:00:00
Link: CVE-2015-6832
No data.
Status : Deferred
Published: 2016-01-19T05:59:03.607
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-6832
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN