7.5
CVSSv2

CVE-2016-7479

Published: 12/01/2017 Updated: 04/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 7.1.0

php php 7.0.0

php php 7.0.3

php php 7.0.4

php php 7.0.1

php php 7.0.10

php php 7.0.5

php php 7.0.6

php php 7.0.11

php php 7.0.12

php php 7.0.7

php php 7.0.8

php php 7.0.14

php php 7.0.2

php php 7.0.9

Vendor Advisories

Synopsis Moderate: rh-php70-php security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php70-php is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabilit ...
Several security issues were fixed in PHP ...
USN-3211-1 introduced a regression in PHP ...
Several security issues were fixed in PHP ...
Integer overflow in gd_ioc in the GD Graphics Library (aka libgd) before 224 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image (CVE-2016-10168) In all versions of PHP 7, during the unserialization process, resizing the 'properties'; hash table of a serialized object ...