ALAS-2017-788 ---- php70ID: oval:org.secpod.oval:def:1600498 | Date: (C)2017-01-27 (M)2023-11-10 |
Class: PATCH | Family: unix |
The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service via crafted serialized data. Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing. Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library before 2.2.2, as used in PHP 7.x before 7.0.13, allows remote attackers to cause a denial of service via a crafted imagefilltoborder call that triggers use of a negative color value. ext/wddx/wddx.c in PHP 7.x before 7.0.13 allows remote attackers to cause a denial of service via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string. The php_wddx_push_element function in ext/wddx/wddx.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document. The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data. This vulnerability exists because of an incomplete fix for CVE-2015-6834
Platform: |
Amazon Linux AMI |