[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Multiple use-after-free vulnerabilities in apache_mod_php in Apple OS X via crafted serialized input

ID: oval:org.secpod.oval:def:31475Date: (C)2015-11-20   (M)2024-02-19
Class: VULNERABILITYFamily: macos




The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function. Successful exploitation could allow remote attackers to execute arbitrary code.

Platform:
Apple Mac OS X 10.6
Apple Mac OS X 10.7
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X Server 10.6
Apple Mac OS X Server 10.7
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Reference:
CVE-2015-0273
CVE    1
CVE-2015-0273
CPE    2
cpe:/o:apple:mac_os_x
cpe:/o:apple:mac_os_x_server

© SecPod Technologies