vulnerability
Cent OS: CVE-2015-4600: CESA-2015:1218 (php)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | May 16, 2016 | Dec 1, 2016 | Oct 30, 2017 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
May 16, 2016
Added
Dec 1, 2016
Modified
Oct 30, 2017
Description
The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
Solution(s)
centos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-clicentos-upgrade-php-commoncentos-upgrade-php-dbacentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-enchantcentos-upgrade-php-fpmcentos-upgrade-php-gdcentos-upgrade-php-imapcentos-upgrade-php-intlcentos-upgrade-php-ldapcentos-upgrade-php-mbstringcentos-upgrade-php-mysqlcentos-upgrade-php-mysqlndcentos-upgrade-php-odbccentos-upgrade-php-pdocentos-upgrade-php-pgsqlcentos-upgrade-php-processcentos-upgrade-php-pspellcentos-upgrade-php-recodecentos-upgrade-php-snmpcentos-upgrade-php-soapcentos-upgrade-php-tidycentos-upgrade-php-xmlcentos-upgrade-php-xmlrpccentos-upgrade-php-zts

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.