CVE-2016-4342

Impact:
Moderate
Public Date:
2016-01-12
IAVA:
2016-B-0160
CWE:
CWE-665
Bugzilla:
1305536: CVE-2016-4342 php: use of uninitialized pointer in PharFileInfo::getContent

The MITRE CVE dictionary describes this issue as:

ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.

Find out more about CVE-2016-4342 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

CVSS v3 metrics

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-php56-php) RHSA-2016:2750 2016-11-15
Red Hat Software Collections for Red Hat Enterprise Linux 6 (rh-php56-php) RHSA-2016:2750 2016-11-15

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux php55-php Will not fix
Red Hat Software Collections for Red Hat Enterprise Linux php54-php Will not fix
Red Hat Enterprise Linux 7 php Will not fix
Red Hat Enterprise Linux 6 php Will not fix
Red Hat Enterprise Linux 5 php53 Will not fix
Red Hat Enterprise Linux 5 php Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.