Vulnerability Details : CVE-2016-9935
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2016-9935
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*
Threat overview for CVE-2016-9935
Top countries where our scanners detected CVE-2016-9935
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-9935 420,029
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-9935!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-9935
2.93%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-9935
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9935
-
http://www.debian.org/security/2016/dsa-3737
Debian -- Security Information -- DSA-3737-1 php5
-
https://access.redhat.com/errata/RHSA-2018:1296
RHSA-2018:1296 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2016/12/12/2
oss-security - CVE assignment for PHP 5.6.28, 5.6.29, 7.0.13, 7.0.14 and 7.1.0Third Party Advisory
-
https://bugs.php.net/bug.php?id=73631
PHP :: Sec Bug #73631 :: Invalid read when wddx decodes empty boolean elementVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
openSUSE-SU-2017:0061-1: moderate: Security update for php7
-
https://security.gentoo.org/glsa/201702-29
PHP: Multiple vulnerabilities (GLSA 201702-29) — Gentoo security
-
http://www.php.net/ChangeLog-7.php
PHP: PHP 7 ChangeLogRelease Notes;Vendor Advisory
-
http://www.php.net/ChangeLog-5.php
PHP: PHP 5 ChangeLogRelease Notes;Vendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
openSUSE-SU-2016:3239-1: moderate: Security update for php5
-
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
Fix bug #73631 - Invalid read when wddx decodes empty boolean element · php/php-src@66fd442 · GitHubPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/94846
PHP 'ext/wddx/wddx.c' Denial of Service Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
openSUSE-SU-2017:0081-1: moderate: Security update for php5
Jump to