Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
PHP Use-After-Free Remote Code Execution Vulnerability - 01 - Jul15 (Windows)
Information
Severity
Severity
High
Family
Family
Denial of Service
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
8 years ago
Modified
Modified
5 years ago
Summary
This host is installed with PHP and is prone to remote code execution vulnerability.
Insight
Insight
The flaw is due to Use-after-free vulnerability in the 'phar_rename_archive' function in 'phar_object.c' script
Affected Software
Affected Software
PHP versions before 5.5.22 and 5.6.x before 5.6.6
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to PHP 5.5.22 or 5.6.6 or later.