2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-7803" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2015-12-11T12:00:11.387" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T02:37:25.993" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n phar_get_entry_data en ext/phar/util.c en PHP en versiones anteriores a 5.5.30 y 5.6.x en versiones anteriores a 5.6.14 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de un archivo .phar con una entrada de archivo TAR manipulada en la cual el indicador Link referencia a un archivo que no existe."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "5.5.29" ,
"matchCriteriaId" : "A5AA54F4-B4D5-47A3-AA95-8D18A52AC212"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1F13E2D-A8F7-4B74-8D03-7905C81672C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE18933A-5FE6-41C7-B1B6-DA3E762C3FB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AE1289F-03A6-4621-B387-5F5ADAC4AE92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "383697F5-D29E-475A-84F3-46B54A928889"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "786ED182-5D71-4197-9196-12AB5CF05F85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF90980D-74AD-44AA-A7C5-A0B294CCE4F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48D6B69C-8F27-4F4C-B953-67A7F9C2FBA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B53DC0C3-EA19-4465-B65A-BC7CDB10D8BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEA4DFC1-6C0C-42FB-9F47-E3E1AA9E47E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D904E21A-4B3B-4D96-850C-0C0315F14E6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7CEF6D7-8966-45E7-BEBB-12055F5898C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "171C1035-414C-4F3A-90F4-1A8ED26E3346"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "725BBA4E-B3BA-4AFA-A284-E0CDE3EC8FB4"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.11.1" ,
"matchCriteriaId" : "767D7ECF-24C5-4605-9368-5A41456A475E"
}
]
}
]
}
] ,
"references" : [
{
2023-11-07 21:03:21 +00:00
"url" : "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=d698f0ae51f67c9cce870b09c59df3d6ba959244" ,
2023-04-24 12:24:31 +02:00
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3380" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/10/05/8" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.php.net/ChangeLog-5.php" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/76959" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2786-1" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://bugs.php.net/bug.php?id=69720" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201606-10" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://support.apple.com/HT205637" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=d698f0ae51f67c9cce870b09c59df3d6ba959244" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3380" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/10/05/8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.php.net/ChangeLog-5.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/76959" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2786-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://bugs.php.net/bug.php?id=69720" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201606-10" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://support.apple.com/HT205637" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
2024-12-08 03:06:42 +00:00
] ,
"evaluatorComment" : "<a href=\"https://cwe.mitre.org/data/definitions/476.html\">CWE-476: NULL Pointer Dereference</a>\n\n<a href=\"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\">Per Advisory: The attack can lead to remote code execution"
2023-04-24 12:24:31 +02:00
}