668
VMScore

CVE-2015-8835

Published: 16/05/2016 Updated: 05/01/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The make_http_soap_request function in ext/soap/php_http.c in PHP prior to 5.4.44, 5.5.x prior to 5.5.28, and 5.6.x prior to 5.6.12 does not properly retrieve keys, which allows remote malicious users to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.2

php php 5.6.11

php php 5.6.0

php php 5.6.5

php php 5.6.4

php php 5.6.3

php php 5.6.9

php php 5.6.8

php php 5.6.10

php php 5.6.1

php php 5.6.7

php php 5.6.6

php php 5.5.15

php php 5.5.9

php php 5.5.26

php php 5.5.25

php php 5.5.19

php php 5.5.18

php php 5.5.0

php php 5.5.17

php php 5.5.16

php php 5.5.3

php php 5.5.27

php php 5.5.20

php php 5.5.2

php php 5.5.10

php php 5.5.1

php php 5.5.8

php php 5.5.7

php php 5.5.24

php php 5.5.23

php php 5.5.14

php php 5.5.13

php php 5.5.6

php php 5.5.5

php php 5.5.4

php php 5.5.22

php php 5.5.21

php php 5.5.12

php php 5.5.11

php php

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
USN-2952-1 caused a regression in PHP ...
Several security issues were fixed in PHP ...
The make_http_soap_request function in ext/soap/php_httpc in PHP before 5444, 55x before 5528, and 56x before 5612 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data rep ...