cvelist/2015/6xxx/CVE-2015-6831.json
2019-03-17 21:36:53 +00:00

102 lines
3.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ID": "CVE-2015-6831",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-3344",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "76737",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76737"
},
{
"name": "https://bugs.php.net/bug.php?id=70169",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70169"
},
{
"name": "https://bugs.php.net/bug.php?id=70168",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70168"
},
{
"name": "[oss-security] 20150819 CVE Request: more php unserializing issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/19/3"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "https://bugs.php.net/bug.php?id=70166",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70166"
},
{
"name": "https://bugs.php.net/bug.php?id=70155",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70155"
},
{
"name": "GLSA-201606-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-10"
}
]
}
}