9.8
CVSSv3

CVE-2016-6290

Published: 25/07/2016 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

ext/session/session.c in PHP prior to 5.5.38, 5.6.x prior to 5.6.24, and 7.x prior to 7.0.9 does not properly maintain a certain hash data structure, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.1

php php 5.6.0

php php 5.6.5

php php 7.0.4

php php 5.6.12

php php 5.6.13

php php 5.6.4

php php 7.0.3

php php 5.6.6

php php 7.0.1

php php 5.6.18

php php 5.6.11

php php 5.6.2

php php 5.6.10

php php

php php 5.6.7

php php 5.6.21

php php 5.6.15

php php 5.6.20

php php 7.0.2

php php 5.6.17

php php 5.6.16

php php 5.6.23

php php 7.0.8

php php 5.6.9

php php 7.0.5

php php 5.6.3

php php 7.0.0

php php 5.6.8

php php 5.6.22

php php 5.6.14

php php 5.6.19

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
Several security issues were fixed in PHP ...
ext/session/sessionc in PHP before 5538, 56x before 5624, and 7x before 709 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization ...