Input validation error in PHP - CVE-2015-6831
Published: January 19, 2016 / Updated: August 9, 2020
PHP
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
How to mitigate CVE-2015-6831
Sources
- http://www.debian.org/security/2015/dsa-3344
- http://www.openwall.com/lists/oss-security/2015/08/19/3
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/76737
- https://bugs.php.net/bug.php?id=70155
- https://bugs.php.net/bug.php?id=70166
- https://bugs.php.net/bug.php?id=70168
- https://bugs.php.net/bug.php?id=70169
- https://security.gentoo.org/glsa/201606-10