8.2
CVSSv3

CVE-2016-3142

Published: 31/03/2016 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.2 | Impact Score: 4.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The phar_parse_zipfile function in zip.c in the PHAR extension in PHP prior to 5.5.33 and 5.6.x prior to 5.6.19 allows remote malicious users to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.1

php php 5.6.5

php php 5.6.12

php php 5.6.13

php php 5.6.0

php php 5.6.4

php php 5.6.6

php php 5.6.18

php php 5.6.11

php php 5.6.2

php php 5.6.10

php php 5.6.7

php php 5.6.15

php php

php php 5.6.17

php php 5.6.16

php php 5.6.9

php php 5.6.3

php php 5.6.8

php php 5.6.14

apple mac os x

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
USN-2952-1 caused a regression in PHP ...
Several security issues were fixed in PHP ...
The phar_parse_zipfile function in zipc in the PHAR extension in PHP before 5533 and 56x before 5619 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location ...