CVE-2015-6831

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:35

Type Values Removed Values Added
References () http://www.debian.org/security/2015/dsa-3344 - () http://www.debian.org/security/2015/dsa-3344 -
References () http://www.openwall.com/lists/oss-security/2015/08/19/3 - () http://www.openwall.com/lists/oss-security/2015/08/19/3 -
References () http://www.php.net/ChangeLog-5.php - () http://www.php.net/ChangeLog-5.php -
References () http://www.securityfocus.com/bid/76737 - () http://www.securityfocus.com/bid/76737 -
References () https://bugs.php.net/bug.php?id=70155 - () https://bugs.php.net/bug.php?id=70155 -
References () https://bugs.php.net/bug.php?id=70166 - () https://bugs.php.net/bug.php?id=70166 -
References () https://bugs.php.net/bug.php?id=70168 - () https://bugs.php.net/bug.php?id=70168 -
References () https://bugs.php.net/bug.php?id=70169 - () https://bugs.php.net/bug.php?id=70169 -
References () https://security.gentoo.org/glsa/201606-10 - () https://security.gentoo.org/glsa/201606-10 -

07 Nov 2023, 02:27

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2015/08/19/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/08/19/3 -
References (BID) http://www.securityfocus.com/bid/76737 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/76737 -
References (CONFIRM) https://bugs.php.net/bug.php?id=70169 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=70169 -
References (DEBIAN) http://www.debian.org/security/2015/dsa-3344 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3344 -
References (GENTOO) https://security.gentoo.org/glsa/201606-10 - Third Party Advisory () https://security.gentoo.org/glsa/201606-10 -
References (CONFIRM) https://bugs.php.net/bug.php?id=70155 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=70155 -
References (CONFIRM) http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory () http://www.php.net/ChangeLog-5.php -
References (CONFIRM) https://bugs.php.net/bug.php?id=70168 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=70168 -
References (CONFIRM) https://bugs.php.net/bug.php?id=70166 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=70166 -

Information

Published : 2016-01-19 05:59

Updated : 2024-11-21 02:35


NVD link : CVE-2015-6831

Mitre link : CVE-2015-6831

CVE.ORG link : CVE-2015-6831


JSON object : View

Products Affected

php

  • php

debian

  • debian_linux
CWE
CWE-416

Use After Free