Description
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-341-1 | php5 security update |
EUVD |
EUVD-2015-6768 | Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field. |
Ubuntu USN |
USN-2758-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T07:36:33.365Z
Reserved: 2015-09-08T00:00:00.000Z
Link: CVE-2015-6832
No data.
Status : Modified
Published: 2016-01-19T05:59:03.607
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-6832
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN