Multiple use-after-free vulnerabilities in apache_mod_php in Apple OS X via crafted serialized inputID: oval:org.secpod.oval:def:31475 | Date: (C)2015-11-20 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function. Successful exploitation could allow remote attackers to execute arbitrary code.
Platform: |
Apple Mac OS X 10.6 |
Apple Mac OS X 10.7 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X Server 10.6 |
Apple Mac OS X Server 10.7 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server 10.11 |