[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-6836Date: (C)2016-02-11   (M)2024-04-19


The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.3CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.4Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
SECTRACK-1033548
BID-76644
DSA-3358
GLSA-201606-10
http://www.php.net/ChangeLog-5.php
https://bugs.php.net/bug.php?id=70388

CPE    59
cpe:/a:php:php:5.5.0
cpe:/a:php:php:5.5.0:beta4
cpe:/a:php:php:5.5.1
cpe:/a:php:php:5.5.0:beta3
...
OVAL    14
oval:org.secpod.oval:def:1600402
oval:org.secpod.oval:def:52590
oval:org.secpod.oval:def:89045425
oval:org.secpod.oval:def:702772
...

© SecPod Technologies