CVE-2015-5589
16.05.2016, 10:59
The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 5.6.0:alpha1 |
php | php | 5.6.0:alpha2 |
php | php | 5.6.0:alpha3 |
php | php | 5.6.0:alpha4 |
php | php | 5.6.0:alpha5 |
php | php | 5.6.0:beta1 |
php | php | 5.6.0:beta2 |
php | php | 5.6.0:beta3 |
php | php | 5.6.0:beta4 |
php | php | 5.6.1 |
php | php | 5.6.2 |
php | php | 5.6.3 |
php | php | 5.6.4 |
php | php | 5.6.5 |
php | php | 5.6.6 |
php | php | 5.6.7 |
php | php | 5.6.8 |
php | php | 5.6.9 |
php | php | 5.6.10 |
php | php | 5.5.0 |
php | php | 5.5.0:alpha1 |
php | php | 5.5.0:alpha2 |
php | php | 5.5.0:alpha3 |
php | php | 5.5.0:alpha4 |
php | php | 5.5.0:alpha5 |
php | php | 5.5.0:alpha6 |
php | php | 5.5.0:beta1 |
php | php | 5.5.0:beta2 |
php | php | 5.5.0:beta3 |
php | php | 5.5.0:beta4 |
php | php | 5.5.0:rc1 |
php | php | 5.5.0:rc2 |
php | php | 5.5.1 |
php | php | 5.5.2 |
php | php | 5.5.3 |
php | php | 5.5.4 |
php | php | 5.5.5 |
php | php | 5.5.6 |
php | php | 5.5.7 |
php | php | 5.5.8 |
php | php | 5.5.9 |
php | php | 5.5.10 |
php | php | 5.5.11 |
php | php | 5.5.12 |
php | php | 5.5.13 |
php | php | 5.5.14 |
php | php | 5.5.15 |
php | php | 5.5.16 |
php | php | 5.5.17 |
php | php | 5.5.18 |
php | php | 5.5.19 |
php | php | 5.5.20 |
php | php | 5.5.21 |
php | php | 5.5.22 |
php | php | 5.5.23 |
php | php | 5.5.24 |
php | php | 5.5.25 |
php | php | 5.5.26 |
php | php | 𝑥 ≤ 5.4.42 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References