CVE-2016-4070

Published on: 05/20/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Php from Php contain the following vulnerability:

** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."

  • CVE-2016-4070 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
About the security content of OS X El Capitan v10.11.5 and Security Update 2016-003 - Apple Support support.apple.com
text/html
URL Logo CONFIRM support.apple.com/HT206567
APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003 lists.apple.com
text/html
URL Logo APPLE APPLE-SA-2016-05-16-4
PHP 'php_raw_url_encode()' Function Integer Overflow Vulnerability cve.report (archive)
text/html
URL Logo BID 85801
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
USN-2952-2: PHP regression | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2952-2
[security-announce] openSUSE-SU-2016:1274-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1274
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
208.43.231.11 Git - php-src.git/commit git.php.net
text/xml
URL Logo CONFIRM git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
[security-announce] SUSE-SU-2016:1277-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1277
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2750
oss-security - Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
USN-2952-1: PHP vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2952-1
Debian -- Security Information -- DSA-3560-1 php5 www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3560
PHP: PHP 7 ChangeLog www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-7.php
PHP: PHP 5 ChangeLog www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-5.php
PHP :: Sec Bug #71798 :: Integer Overflow in php_raw_url_encode Exploit
bugs.php.net
text/html
URL Logo CONFIRM bugs.php.net/bug.php?id=71798
[security-announce] openSUSE-SU-2016:1373-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1373

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPhpPhp5.6.0alpha1AllAll
ApplicationPhpPhp5.6.0alpha2AllAll
ApplicationPhpPhp5.6.0alpha3AllAll
ApplicationPhpPhp5.6.0alpha4AllAll
ApplicationPhpPhp5.6.0alpha5AllAll
ApplicationPhpPhp5.6.0beta1AllAll
ApplicationPhpPhp5.6.0beta2AllAll
ApplicationPhpPhp5.6.0beta3AllAll
ApplicationPhpPhp5.6.0beta4AllAll
ApplicationPhpPhp5.6.1AllAllAll
ApplicationPhpPhp5.6.10AllAllAll
ApplicationPhpPhp5.6.11AllAllAll
ApplicationPhpPhp5.6.12AllAllAll
ApplicationPhpPhp5.6.13AllAllAll
ApplicationPhpPhp5.6.14AllAllAll
ApplicationPhpPhp5.6.15AllAllAll
ApplicationPhpPhp5.6.16AllAllAll
ApplicationPhpPhp5.6.17AllAllAll
ApplicationPhpPhp5.6.18AllAllAll
ApplicationPhpPhp5.6.19AllAllAll
ApplicationPhpPhp5.6.2AllAllAll
ApplicationPhpPhp5.6.3AllAllAll
ApplicationPhpPhp5.6.4AllAllAll
ApplicationPhpPhp5.6.5AllAllAll
ApplicationPhpPhp5.6.6AllAllAll
ApplicationPhpPhp5.6.7AllAllAll
ApplicationPhpPhp5.6.8AllAllAll
ApplicationPhpPhp5.6.9AllAllAll
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhp5.6.0alpha1AllAll
ApplicationPhpPhp5.6.0alpha2AllAll
ApplicationPhpPhp5.6.0alpha3AllAll
ApplicationPhpPhp5.6.0alpha4AllAll
ApplicationPhpPhp5.6.0alpha5AllAll
ApplicationPhpPhp5.6.0beta1AllAll
ApplicationPhpPhp5.6.0beta2AllAll
ApplicationPhpPhp5.6.0beta3AllAll
ApplicationPhpPhp5.6.0beta4AllAll
ApplicationPhpPhp5.6.1AllAllAll
ApplicationPhpPhp5.6.10AllAllAll
ApplicationPhpPhp5.6.11AllAllAll
ApplicationPhpPhp5.6.12AllAllAll
ApplicationPhpPhp5.6.13AllAllAll
ApplicationPhpPhp5.6.14AllAllAll
ApplicationPhpPhp5.6.15AllAllAll
ApplicationPhpPhp5.6.16AllAllAll
ApplicationPhpPhp5.6.17AllAllAll
ApplicationPhpPhp5.6.18AllAllAll
ApplicationPhpPhp5.6.19AllAllAll
ApplicationPhpPhp5.6.2AllAllAll
ApplicationPhpPhp5.6.3AllAllAll
ApplicationPhpPhp5.6.4AllAllAll
ApplicationPhpPhp5.6.5AllAllAll
ApplicationPhpPhp5.6.6AllAllAll
ApplicationPhpPhp5.6.7AllAllAll
ApplicationPhpPhp5.6.8AllAllAll
ApplicationPhpPhp5.6.9AllAllAll
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhpAllAllAllAll
  • cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:*:*:*:*:*:*:*:*: