Description
The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-749-1 | php5 security update |
Debian DSA |
DSA-3689-1 | php5 security update |
EUVD |
EUVD-2016-8267 | The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c. |
Ubuntu USN |
USN-3095-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:57:47.609Z
Reserved: 2016-09-09T00:00:00.000Z
Link: CVE-2016-7414
No data.
Status : Modified
Published: 2016-09-17T21:59:06.027
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-7414
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN