Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=f59b67ae50064560d7bfcdb0d6a8ab284179053c - | |
References | () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - Mailing List, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html - Mailing List, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00004.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html - | |
References | () http://php.net/ChangeLog-5.php - Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1066.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1135.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1186.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1187.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1218.html - | |
References | () http://www.debian.org/security/2015/dsa-3280 - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74240 - | |
References | () http://www.securitytracker.com/id/1032145 - | |
References | () http://www.ubuntu.com/usn/USN-2572-1 - | |
References | () https://bugs.php.net/bug.php?id=69441 - Exploit, Patch | |
References | () https://security.gentoo.org/glsa/201606-10 - | |
References | () https://support.apple.com/HT205267 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT205031 - Third Party Advisory |
07 Nov 2023, 02:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-06-09 18:59
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3329
Mitre link : CVE-2015-3329
CVE.ORG link : CVE-2015-3329
JSON object : View
Products Affected
php
- php
apple
- mac_os_x
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_hpc_node_eus
- enterprise_linux_hpc_node
- enterprise_linux_workstation
oracle
- linux
- solaris
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer