CVE-2016-6290Use After Free in PHP

CWE-416Use After Free9 documents7 sources
Severity
9.8CRITICALNVD
EPSS
8.4%
top 7.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 25
Latest updateMay 14

Description

ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Ubuntuphp5/php5< 5.5.9+dfsg-1ubuntu4.19
NVDphp/php5.5.37+31
Appleapple/macos_sierra10.12

🔴Vulnerability Details

3
GHSA
GHSA-v42h-9gp8-3hfq: ext/session/session2022-05-14
OSV
php5, php7.0 vulnerabilities2016-08-02
OSV
CVE-2016-6290: ext/session/session2016-07-25

📋Vendor Advisories

3
Apple
CVE-2016-6290: macOS Sierra 10.122016-09-20
Ubuntu
PHP vulnerabilities2016-08-02
Red Hat
php: Use after free in unserialize() with Unexpected Session Deserialization2016-07-08

💬Community

2
Bugzilla
CVE-2016-6290 php: Use after free in unserialize() with Unexpected Session Deserialization2016-07-25
Bugzilla
CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6294 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297 php: various flaws [fedora-all]2016-07-25
CVE-2016-6290 — Use After Free in PHP | cvebase