668
VMScore

CVE-2016-4538

Published: 22/05/2016 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The bcpowmod function in ext/bcmath/bcmath.c in PHP prior to 5.5.35, 5.6.x prior to 5.6.21, and 7.x prior to 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.1

php php 5.6.5

php php 7.0.4

php php 5.6.12

php php 5.6.13

php php 5.6.0

php php 5.6.4

php php 7.0.3

php php 5.6.6

php php 7.0.1

php php 5.6.18

php php 5.6.11

php php 5.6.2

php php 5.6.10

php php

php php 5.6.7

php php 5.6.15

php php 5.6.20

php php 7.0.2

php php 5.6.17

php php 5.6.16

php php 5.6.9

php php 7.0.5

php php 5.6.3

php php 7.0.0

php php 5.6.8

php php 5.6.14

php php 5.6.19

fedoraproject fedora 24

opensuse leap 42.1

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
Several security issues were fixed in PHP ...
Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development The vulnerabilities are addressed by upgrading PHP to the new upstream version 5622, which includes additional bug fixes Please refer to the upstream changelog for more information: phpnet/ChangeLog-5php#562 ...
The bcpowmod function in ext/bcmath/bcmathc in PHP before 5535, 56x before 5621, and 7x before 706 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted c ...