CVE-2016-10162

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10162
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10162.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-10162
Downstream
Related
Published
2017-01-24T21:59:00Z
Modified
2025-10-10T00:20:18.946444Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The phpwddxpopelement function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddxdeserialize call.

References

Affected packages

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

NEWS
NEWS-cvs2svn
POST_64BIT_BRANCH_MERGE
POST_AST_MERGE
POST_NATIVE_TLS_MERGE
POST_PHP7_EREG_MYSQL_REMOVALS
POST_PHP7_NSAPI_REMOVAL
POST_PHP7_REMOVALS
POST_PHPNG_MERGE
PRE_64BIT_BRANCH_MERGE
PRE_AST_MERGE
PRE_NATIVE_TLS_MERGE
PRE_PHP7_EREG_MYSQL_REMOVALS
PRE_PHP7_NSAPI_REMOVAL
PRE_PHP7_REMOVALS
PRE_PHPNG_MERGE

php-5.*

php-5.3.23RC1
php-5.3.29
php-5.3.29RC1
php-5.4.30RC1
php-5.4.32RC1
php-5.4.4RC2
php-5.5.24RC1
php-5.6.18RC1
php-5.6.19RC1
php-5.6.22RC1
php-5.6.23RC1
php-5.6.24RC1

php-7.*

php-7.0.11RC1
php-7.0.12RC1
php-7.0.13RC1
php-7.0.3RC1
php-7.0.4RC1
php-7.0.5RC1
php-7.0.7RC1
php-7.0.8RC1
php-7.0.9RC1

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2016-10162-7e6f783f",
            "digest": {
                "length": 3459.0,
                "function_hash": "52155622896470577037637253148168673813"
            },
            "target": {
                "function": "php_wddx_pop_element",
                "file": "ext/wddx/wddx.c"
            },
            "source": "https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b",
            "signature_version": "v1",
            "deprecated": false,
            "signature_type": "Function"
        },
        {
            "id": "CVE-2016-10162-920d982d",
            "digest": {
                "line_hashes": [
                    "1620018376375737470682412624291272126",
                    "75860513361137437258853901596366910981",
                    "157230416959749458864575248492656206639",
                    "22900006191810578093947685641424325424",
                    "211965975932477732014969696767726657886",
                    "185584415137237897076600071513667432310",
                    "54977184172081566024379389457367593029",
                    "68290105138880958354684018990467199094",
                    "256219010245046166543126998915680796348",
                    "299104130098631164721253267590865955096",
                    "194343109413117409065661647869676528118",
                    "190131494537551333221630627471275714625",
                    "149280764790086418306903979506717890826",
                    "7347544924061215204222971421391995387",
                    "90515752481232727115992206495968917950"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "ext/wddx/wddx.c"
            },
            "source": "https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b",
            "signature_version": "v1",
            "deprecated": false,
            "signature_type": "Line"
        }
    ]
}