CVE-2016-7414

Priority
Description
The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before
7.0.11 does not ensure that the uncompressed_filesize field is large
enough, which allows remote attackers to cause a denial of service
(out-of-bounds memory access) or possibly have unspecified other impact via
a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
Assigned-to
mdeslaur
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.26)
Ubuntu 14.04 LTS (Trusty Tahr):released (5.5.9+dfsg-1ubuntu4.20)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=223266e4e46b9188353db93771369078c2e94353
Package
Upstream:released (7.0.11)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (7.0.8-0ubuntu0.16.04.3)
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=0bfb970f43acd1e81d11be1154805f86655f15d5
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=223266e4e46b9188353db93771369078c2e94353
More Information

Updated: 2018-10-31 21:24:25 UTC (commit cfa7cf69d76449ccff972ac22f40976a08d908c2)