CVE-2016-5095 (retired)

Priority
Description
Integer overflow in the php_escape_html_entities_ex function in
ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows
remote attackers to cause a denial of service or possibly have unspecified
other impact by triggering a large output string from a
FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2016-5094.
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.22+dfsg-1)
Ubuntu 14.04 LTS (Trusty Tahr):released (5.5.9+dfsg-1ubuntu4.19)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=41fc3c76e97a36ff3b505da7d704ca17bb171fdf
More Information

Updated: 2019-03-26 12:21:52 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)