SB2016091203 - Deserialization of Untrusted Data in PHP
Published: September 12, 2016 Updated: November 28, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Deserialization of Untrusted Data (CVE-ID: CVE-2016-7124)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing certain objects in "ext/standard/var_unserializer.c" PHP extension. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system via "__destruct" or "magic" method calls.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- http://openwall.com/lists/oss-security/2016/09/02/9
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-7.php
- http://www.securityfocus.com/bid/92756
- http://www.securitytracker.com/id/1036680
- https://bugs.php.net/bug.php?id=72663
- https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
- https://security.gentoo.org/glsa/201611-22
- https://www.tenable.com/security/tns-2016-19