CVE-2016-7412

Published on: 09/17/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Php from Php contain the following vulnerability:

ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.

  • CVE-2016-7412 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
PHP Multiple Memory Corruption Errors Let Remote and Local Users Execute Arbitrary Code on the Target System - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036836
[R6] SecurityCenter 5.4.1 Fixes Multiple Vulnerabilities - Security Advisory | Tenable Network Security www.tenable.com
text/html
URL Logo CONFIRM www.tenable.com/security/tns-2016-19
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2018:1296
PHP :: Sec Bug #72293 :: Heap overflow in mysqlnd related to BIT fields Exploit
Issue Tracking
bugs.php.net
text/html
URL Logo CONFIRM bugs.php.net/bug.php?id=72293
Fix bug #72293 - Heap overflow in mysqlnd related to BIT fields · php/[email protected] · GitHub Issue Tracking
Patch
github.com
text/html
URL Logo CONFIRM github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
oss-security - Re: CVE assignment for PHP 5.6.26 and 7.0.11 Mailing List
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160915 Re: CVE assignment for PHP 5.6.26 and 7.0.11
PHP: PHP 7 ChangeLog Release Notes
www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-7.php
PHP: PHP 5 ChangeLog Release Notes
www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-5.php
PHP: Multiple vulnerabilities (GLSA 201611-22) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201611-22
PHP CVE-2016-7412 Heap Based Buffer Overflow Vulnerability cve.report (archive)
text/html
URL Logo BID 93005

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.10AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhp7.0.5AllAllAll
ApplicationPhpPhp7.0.6AllAllAll
ApplicationPhpPhp7.0.7AllAllAll
ApplicationPhpPhp7.0.8AllAllAll
ApplicationPhpPhp7.0.9AllAllAll
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.10AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhp7.0.5AllAllAll
ApplicationPhpPhp7.0.6AllAllAll
ApplicationPhpPhp7.0.7AllAllAll
ApplicationPhpPhp7.0.8AllAllAll
ApplicationPhpPhp7.0.9AllAllAll
ApplicationPhpPhpAllAllAllAll
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:*:*:*:*:*:*:*:*: