vulnerability

Cent OS: CVE-2015-4600: CESA-2015:1218 (php)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
May 16, 2016
Added
Dec 1, 2016
Modified
Oct 30, 2017

Description

The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.

Solution(s)

centos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-clicentos-upgrade-php-commoncentos-upgrade-php-dbacentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-enchantcentos-upgrade-php-fpmcentos-upgrade-php-gdcentos-upgrade-php-imapcentos-upgrade-php-intlcentos-upgrade-php-ldapcentos-upgrade-php-mbstringcentos-upgrade-php-mysqlcentos-upgrade-php-mysqlndcentos-upgrade-php-odbccentos-upgrade-php-pdocentos-upgrade-php-pgsqlcentos-upgrade-php-processcentos-upgrade-php-pspellcentos-upgrade-php-recodecentos-upgrade-php-snmpcentos-upgrade-php-soapcentos-upgrade-php-tidycentos-upgrade-php-xmlcentos-upgrade-php-xmlrpccentos-upgrade-php-zts
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.