CVE-2016-4473

CWE-416Use After Free6 documents6 sources
Severity
9.8CRITICAL
EPSS
16.8%
top 5.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateMay 17

Description

/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Ubuntuphp5< 5.5.9+dfsg-1ubuntu4.19
Ubuntuphp7.0< 7.0.8-0ubuntu0.16.04.2
NVDphp/php24 versions+23

Patches

🔴Vulnerability Details

3
GHSA
GHSA-jvpg-hmq4-6326: /ext/phar/phar_object2022-05-17
OSV
CVE-2016-4473: /ext/phar/phar_object2017-06-08
CVEList
CVE-2016-4473: /ext/phar/phar_object2017-06-08

📋Vendor Advisories

1
Red Hat
php: Invalid free() instead of efree() in phar_extract_file()2016-06-21

💬Community

1
Bugzilla
CVE-2016-4473 php: Invalid free() instead of efree() in phar_extract_file()2016-06-17
CVE-2016-4473 (CRITICAL CVSS 9.8) | /ext/phar/phar_object.c in PHP 7.0. | cvebase.io