OS X update for apache_mod_php (CVE-2015-6836)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | January 19, 2016 | March 29, 2016 | November 06, 2017 |
Description
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
Scan For This Vulnerability
Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities
References
Solution
apple-osx-security-update-2015-004-yosemiteRelated Vulnerabilities
- F5 Networks: K17377 (CVE-2015-6836): PHP vulnerabilities CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, and CVE-2015-6838
- Alpine Linux: CVE-2015-6836: php multiple vulnerabilities
- PHP Vulnerability: CVE-2015-6836
- DSA-3358-1 php5 -- security update
- Amazon Linux AMI: Security patch for php56 (ALAS-2015-601) (multiple CVEs)
- Gentoo Linux: CVE-2015-6836: PHP: Multiple vulnerabilities
- USN-2758-1: PHP vulnerabilities
- FreeBSD: php -- multiple vulnerabilities (Multiple CVEs)
- Oracle Solaris 11: CVE-2015-6836 (11.4 GA)
- Amazon Linux AMI: Security patch for php55 (ALAS-2015-602) (multiple CVEs)
- OS X update for Accelerate Framework (CVE-2015-6836)
- SUSE: CVE-2015-6836: SUSE Linux Security Advisory
- Amazon Linux AMI: Security patch for php54 (ALAS-2016-670) (multiple CVEs)