Vulnerability identifier: #VU40282
Vulnerability risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a local authenticated user to #BASIC_IMPACT#.
The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 5.5.0 - 5.5.27, 5.6.0 - 5.6.11, 7.0.0 - 7.0.3
External links
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
https://php.net/ChangeLog-5.php
https://php.net/ChangeLog-7.php
https://www.securityfocus.com/bid/84307
https://www.ubuntu.com/usn/USN-2952-1
https://www.ubuntu.com/usn/USN-2952-2
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.