CVE-2016-7417

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-7417
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7417.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-7417
Downstream
Related
Published
2016-09-17T21:59:09Z
Modified
2025-10-10T00:48:49.006787Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.

References

Affected packages

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

NEWS
NEWS-cvs2svn

php-5.*

php-5.3.23RC1
php-5.3.29
php-5.3.29RC1
php-5.4.30RC1
php-5.4.32RC1
php-5.4.4RC2
php-5.5.24RC1
php-5.6.18RC1
php-5.6.19RC1
php-5.6.22RC1
php-5.6.23RC1
php-5.6.24RC1

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2016-7417-095ecdd9",
            "digest": {
                "length": 2221.0,
                "function_hash": "69361654777367811429259649189470587793"
            },
            "signature_version": "v1",
            "target": {
                "function": "spl_array_get_dimension_ptr_ptr",
                "file": "ext/spl/spl_array.c"
            },
            "source": "https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e",
            "deprecated": false,
            "signature_type": "Function"
        },
        {
            "id": "CVE-2016-7417-4686c884",
            "digest": {
                "length": 2242.0,
                "function_hash": "246905147912979810497061197420130037929"
            },
            "signature_version": "v1",
            "target": {
                "function": "SPL_METHOD",
                "file": "ext/spl/spl_array.c"
            },
            "source": "https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e",
            "deprecated": false,
            "signature_type": "Function"
        },
        {
            "id": "CVE-2016-7417-7a48b571",
            "digest": {
                "line_hashes": [
                    "266952166830915838201271051994753130715",
                    "207964066635493323642699902541850122321",
                    "5038839080791670529398891548668859066",
                    "24288029030073466103399865881525124107",
                    "88817205020501499550056928229111185711",
                    "257461891663215117017180759178269265320",
                    "164834675769871618608288792068169801782",
                    "16319034179528976894643980293053751032",
                    "142509527067809101064086982292036481087",
                    "17804188571802942185884872333072458209",
                    "89590806254053423398901816246695819240",
                    "40054267297084512056912605186284558878",
                    "252539200488850829855380404368122843938",
                    "192359760140051159435287622956306406946",
                    "62831633385099930540696211894894254619",
                    "20968863528423225604143902079584380735"
                ],
                "threshold": 0.9
            },
            "signature_version": "v1",
            "target": {
                "file": "ext/spl/spl_array.c"
            },
            "source": "https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e",
            "deprecated": false,
            "signature_type": "Line"
        }
    ]
}