7.5
CVSSv2

CVE-2015-0273

Published: 30/03/2015 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP prior to 5.4.38, 5.5.x prior to 5.5.22, and 5.6.x prior to 5.6.6 allow remote malicious users to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.1

php php 5.5.0

php php 5.6.0

php php 5.6.5

php php 5.5.19

php php 5.5.16

php php 5.5.1

php php 5.5.5

php php 5.6.4

php php 5.5.21

php php 5.5.17

php php

php php 5.5.14

php php 5.5.7

php php 5.6.2

php php 5.5.12

php php 5.5.6

php php 5.5.3

php php 5.5.8

php php 5.5.15

php php 5.5.11

php php 5.5.13

php php 5.5.4

php php 5.5.10

php php 5.6.3

php php 5.5.18

php php 5.5.20

php php 5.5.2

php php 5.5.9

Vendor Advisories

Debian Bug report logs - #778389 php5: CVE-2015-2305: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Luciano Bello < ...
Several security issues were fixed in PHP ...
A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application ...
A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application ...

Exploits

Use After Free Vulnerability in unserialize() with DateTime* [CVE-2015-0273] Taoguang Chen <[@chtg](githubcom/chtg)> - Write Date: 2015129 - Release Date: 2015220 A use-after-free vulnerability was discovered in unserialize() with DateTime/DateTimeZone/DateInterval/DatePeriod objects's __wakeup() magic method that can be abused ...
PHP versions below 566, below 5522, and below 5438 suffer from a use-after-free vulnerability in DateTime ...

Github Repositories

Collection of CTF Web challenges I made

My CTF Web Challenges This is the repository of all CTF challenges I made, including the source code, write-up and idea explanation! Hope you like it :) Ps BTW, the Babyfirst series and One Line PHP Challenge are my favorite challenges If you haven't enough time, please look them at least! Babyfirst Babyfirst Revenge Babyfirst Revenge v2 One Line PHP Challenge And yo

My CTF Web Challenges This is the repository of all CTF challenges I made, including the source code, write-up and idea explanation! Hope you like it :) Ps BTW, the Babyfirst series and One Line PHP Challenge are my favorite challenges If you haven't enough time, please look them at least! Babyfirst Babyfirst Revenge Babyfirst Revenge v2 One Line PHP Challenge And yo

References

NVD-CWE-Otherhttps://bugzilla.redhat.com/show_bug.cgi?id=1194730https://bugs.php.net/bug.php?id=68942http://php.net/ChangeLog-5.phphttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.htmlhttp://www.ubuntu.com/usn/USN-2535-1http://www.debian.org/security/2015/dsa-3195http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlhttp://support.apple.com/kb/HT204942https://support.apple.com/HT205267http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlhttps://support.apple.com/HT205375http://rhn.redhat.com/errata/RHSA-2015-1135.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.securityfocus.com/bid/72701https://security.gentoo.org/glsa/201606-10http://rhn.redhat.com/errata/RHSA-2015-1218.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1053.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1066.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://marc.info/?l=bugtraq&m=144050155601375&w=2http://marc.info/?l=bugtraq&m=143748090628601&w=2http://marc.info/?l=bugtraq&m=143403519711434&w=2http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.htmlhttp://www.securitytracker.com/id/1031945http://www.mandriva.com/security/advisories?name=MDVSA-2015:079http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=71335e6ebabc1b12c057d8017fd811892ecdfd24https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778389https://usn.ubuntu.com/2535-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/36158/