CVE-2016-3142

Published on: 03/31/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Certain versions of Mac Os X from Apple contain the following vulnerability:

The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.

  • CVE-2016-3142 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.2 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE HIGH

CVSS2 Score: 6.4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE PARTIAL

CVE References

Description Tags Link
About the security content of OS X El Capitan v10.11.5 and Security Update 2016-003 - Apple Support support.apple.com
text/html
URL Logo CONFIRM support.apple.com/HT206567
[security-announce] SUSE-SU-2016:1145-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1145
APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003 lists.apple.com
text/html
URL Logo APPLE APPLE-SA-2016-05-16-4
USN-2952-2: PHP regression | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2952-2
PHP Bugs in Phar and WDDX Let Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035255
72.52.91.13 Git - php-src.git/commit git.php.net
text/xml
URL Logo CONFIRM git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
PHP: PHP 5 ChangeLog php.net
text/html
URL Logo CONFIRM php.net/ChangeLog-5.php
[security-announce] SUSE-SU-2016:1166-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1166
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2750
PHP :: Sec Bug #71498 :: Out-of-Bound Read in phar_parse_zipfile() Exploit
bugs.php.net
text/html
URL Logo CONFIRM bugs.php.net/bug.php?id=71498
USN-2952-1: PHP vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2952-1
[security-announce] openSUSE-SU-2016:1173-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1173
[security-announce] openSUSE-SU-2016:1167-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1167

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
AppleMac Os XAllAllAllAll
ApplicationPhpPhp5.6.0AllAllAll
ApplicationPhpPhp5.6.1AllAllAll
ApplicationPhpPhp5.6.10AllAllAll
ApplicationPhpPhp5.6.11AllAllAll
ApplicationPhpPhp5.6.12AllAllAll
ApplicationPhpPhp5.6.13AllAllAll
ApplicationPhpPhp5.6.14AllAllAll
ApplicationPhpPhp5.6.15AllAllAll
ApplicationPhpPhp5.6.16AllAllAll
ApplicationPhpPhp5.6.17AllAllAll
ApplicationPhpPhp5.6.18AllAllAll
ApplicationPhpPhp5.6.2AllAllAll
ApplicationPhpPhp5.6.3AllAllAll
ApplicationPhpPhp5.6.4AllAllAll
ApplicationPhpPhp5.6.5AllAllAll
ApplicationPhpPhp5.6.6AllAllAll
ApplicationPhpPhp5.6.7AllAllAll
ApplicationPhpPhp5.6.8AllAllAll
ApplicationPhpPhp5.6.9AllAllAll
ApplicationPhpPhp5.6.0AllAllAll
ApplicationPhpPhp5.6.1AllAllAll
ApplicationPhpPhp5.6.10AllAllAll
ApplicationPhpPhp5.6.11AllAllAll
ApplicationPhpPhp5.6.12AllAllAll
ApplicationPhpPhp5.6.13AllAllAll
ApplicationPhpPhp5.6.14AllAllAll
ApplicationPhpPhp5.6.15AllAllAll
ApplicationPhpPhp5.6.16AllAllAll
ApplicationPhpPhp5.6.17AllAllAll
ApplicationPhpPhp5.6.18AllAllAll
ApplicationPhpPhp5.6.2AllAllAll
ApplicationPhpPhp5.6.3AllAllAll
ApplicationPhpPhp5.6.4AllAllAll
ApplicationPhpPhp5.6.5AllAllAll
ApplicationPhpPhp5.6.6AllAllAll
ApplicationPhpPhp5.6.7AllAllAll
ApplicationPhpPhp5.6.8AllAllAll
ApplicationPhpPhp5.6.9AllAllAll
ApplicationPhpPhpAllAllAllAll
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:*:*:*:*:*:*:*:*: