CVE-2016-4342 Details

CVE-2016-4342

Published: 2016-05-22
Last Modified: 2018-10-30
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.

Analysis
Common Vulnerability Score System v2.0
Metrics Value
Severity High
Base Score 8.3/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 8.5/10
Confidentiality Impact Partial
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:M/Au:N/C:P/I:P/A:C
Common Vulnerability Score System v3.1
Metrics Value
Severity High
Base Score 8.8/10
Exploit Score 2.8/10
Access Vector Network
Access Complexity Low
Privileges Required None
Impact Score 5.9/10
Confidentiality Impact High
Availability Impact High
Integrity Impact High
Scope Unchanged
User Interaction Required
Vector String CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:* Yes - -
References

http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://bugs.php.net/bug.php?id=71354
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

CVE ID
CVE-2016-4342
Published
2016-05-22
Modified
2018-10-30
CVSSv2.0
High
CVSSv3.1
High
PCI Compliance
Fail
Data Format
MITRE
Data Type
CVE
Data Version
4.0
CWE

CWE-119

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.