Use-after-free vulnerability in the processnesteddata function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "php5-gd": "5.5.9+dfsg-1ubuntu4.6", "libphp5-embed": "5.5.9+dfsg-1ubuntu4.6", "php5-mysqlnd": "5.5.9+dfsg-1ubuntu4.6", "php5-dbg": "5.5.9+dfsg-1ubuntu4.6", "php-pear": "5.5.9+dfsg-1ubuntu4.6", "php5-cli": "5.5.9+dfsg-1ubuntu4.6", "php5-fpm": "5.5.9+dfsg-1ubuntu4.6", "php5-pspell": "5.5.9+dfsg-1ubuntu4.6", "php5-mysql": "5.5.9+dfsg-1ubuntu4.6", "php5-curl": "5.5.9+dfsg-1ubuntu4.6", "php5-ldap": "5.5.9+dfsg-1ubuntu4.6", "php5-pgsql": "5.5.9+dfsg-1ubuntu4.6", "php5-xsl": "5.5.9+dfsg-1ubuntu4.6", "php5-readline": "5.5.9+dfsg-1ubuntu4.6", "php5-common": "5.5.9+dfsg-1ubuntu4.6", "php5-enchant": "5.5.9+dfsg-1ubuntu4.6", "php5-dev": "5.5.9+dfsg-1ubuntu4.6", "libapache2-mod-php5filter": "5.5.9+dfsg-1ubuntu4.6", "php5": "5.5.9+dfsg-1ubuntu4.6", "php5-sybase": "5.5.9+dfsg-1ubuntu4.6", "php5-gmp": "5.5.9+dfsg-1ubuntu4.6", "php5-odbc": "5.5.9+dfsg-1ubuntu4.6", "php5-cgi": "5.5.9+dfsg-1ubuntu4.6", "php5-recode": "5.5.9+dfsg-1ubuntu4.6", "libapache2-mod-php5": "5.5.9+dfsg-1ubuntu4.6", "php5-snmp": "5.5.9+dfsg-1ubuntu4.6", "php5-sqlite": "5.5.9+dfsg-1ubuntu4.6", "php5-intl": "5.5.9+dfsg-1ubuntu4.6", "php5-xmlrpc": "5.5.9+dfsg-1ubuntu4.6", "php5-tidy": "5.5.9+dfsg-1ubuntu4.6" } ] }