Vulnerability Details : CVE-2016-3142
The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
Vulnerability category: OverflowDenial of service
Threat overview for CVE-2016-3142
Top countries where our scanners detected CVE-2016-3142
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-3142 137,625
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-3142!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-3142
Probability of exploitation activity in the next 30 days: 11.36%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-3142
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST |
8.2
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
3.9
|
4.2
|
NIST |
CWE ids for CVE-2016-3142
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3142
-
https://bugs.php.net/bug.php?id=71498
PHP :: Sec Bug #71498 :: Out-of-Bound Read in phar_parse_zipfile()Exploit
-
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
208.43.231.11 Git - php-src.git/commit
-
http://www.ubuntu.com/usn/USN-2952-1
USN-2952-1: PHP vulnerabilities | Ubuntu security notices
-
http://www.securitytracker.com/id/1035255
PHP Bugs in Phar and WDDX Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
[security-announce] openSUSE-SU-2016:1173-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
[security-announce] SUSE-SU-2016:1166-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
[security-announce] openSUSE-SU-2016:1167-1: important: Security update
-
http://www.ubuntu.com/usn/USN-2952-2
USN-2952-2: PHP regression | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
[security-announce] SUSE-SU-2016:1145-1: important: Security update for
-
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
Apple - Lists.apple.com
-
https://php.net/ChangeLog-5.php
PHP: PHP 5 ChangeLog
-
https://support.apple.com/HT206567
About the security content of OS X El Capitan v10.11.5 and Security Update 2016-003 - Apple Support
-
http://rhn.redhat.com/errata/RHSA-2016-2750.html
RHSA-2016:2750 - Security Advisory - Red Hat Customer Portal
Products affected by CVE-2016-3142
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*