NULL pointer dereference in PHP - CVE-2016-7130
Published: September 12, 2016 / Updated: August 9, 2020
PHP
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
How to mitigate CVE-2016-7130
Sources
- http://openwall.com/lists/oss-security/2016/09/02/9
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-7.php
- http://www.securityfocus.com/bid/92764
- http://www.securitytracker.com/id/1036680
- https://bugs.php.net/bug.php?id=72750
- https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
- https://security.gentoo.org/glsa/201611-22
- https://www.tenable.com/security/tns-2016-19