7.5
CVSSv2

CVE-2015-0231

Published: 27/01/2015 Updated: 31/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP prior to 5.4.37, 5.5.x prior to 5.5.21, and 5.6.x prior to 5.6.5 allows remote malicious users to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.0

php php 5.5.0

php php 5.5.14

php php 5.5.15

php php 5.5.3

php php 5.5.4

php php 5.4.7

php php 5.4.6

php php 5.4.29

php php 5.4.28

php php 5.4.21

php php 5.4.20

php php 5.4.2

php php 5.4.14

php php 5.4.13

php php 5.4.1

php php 5.4.0

php php 5.6.1

php php 5.5.1

php php 5.5.16

php php 5.5.17

php php 5.5.5

php php 5.5.6

php php 5.5.7

php php 5.4.5

php php 5.4.4

php php 5.4.27

php php 5.4.26

php php 5.4.19

php php 5.4.18

php php 5.4.12

php php

php php 5.6.2

php php 5.6.3

php php 5.5.10

php php 5.5.11

php php 5.5.18

php php 5.5.19

php php 5.5.8

php php 5.5.9

php php 5.4.35

php php 5.4.34

php php 5.4.25

php php 5.4.24

php php 5.4.17

php php 5.4.16

php php 5.6.4

php php 5.5.12

php php 5.5.13

php php 5.5.2

php php 5.5.20

php php 5.4.9

php php 5.4.8

php php 5.4.30

php php 5.4.3

php php 5.4.23

php php 5.4.22

php php 5.4.15

php php 5.4.11

php php 5.4.10

Vendor Advisories

Debian Bug report logs - #780713 php5: CVE-2015-2331 Package: src:php5; Maintainer for src:php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 18 Mar 2015 09:24:07 UTC Severity: grave Tags: security Found in versions php5/566+dfsg-1, p ...
Several security issues were fixed in PHP ...
A use-after-free flaw was found in the way PHP's unserialize() function processed data If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code ...
sapi/cgi/cgi_mainc in the CGI component in PHP through 5436, 55x through 5520, and 56x through 564, when mmap is used to read a php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allo ...
sapi/cgi/cgi_mainc in the CGI component in PHP through 5436, 55x through 5520, and 56x through 564, when mmap is used to read a php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allo ...
A use-after-free flaw was found in the way PHP's unserialize() function processed data If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code (CVE-2015-0231) An integer overflow flaw, leading to a heap-based buffer overflow, was found ...
A use-after-free flaw was found in the way PHP's unserialize() function processed data If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code (CVE-2015-0231) An integer overflow flaw, leading to a heap-based buffer overflow, was found ...
A use-after-free flaw was found in the way PHP's unserialize() function processed data If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code (CVE-2015-0231) An integer overflow flaw, leading to a heap-based buffer overflow, was found ...
PHP contains a use-after-free error in the process_nested_data() function in ext/standard/var_unserializerre With specially crafted input passed to the unserialize() method, a remote attacker can dereference already freed memory and potentially execute arbitrary code (CVE-2014-8142 / CVE-2015-0231) PHP contains a flaw in the exif_process_unicod ...

Exploits

Kerio Control Unified Threat Management versions prior to 913 suffer from unsafe usage of the PHP unserialize function, code execution, memory corruption, cross site scripting, and various other vulnerabilities ...