Critical severity9.8NVD Advisory· Published Aug 7, 2016· Updated May 6, 2026
CVE-2016-5771
CVE-2016-5771
Description
spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203eenvdPatchThird Party Advisory
- php.net/ChangeLog-5.phpnvdPatchRelease NotesVendor Advisory
- www.openwall.com/lists/oss-security/2016/06/23/4nvdMailing ListPatchThird Party Advisory
- bugs.php.net/bug.phpnvdExploitIssue TrackingVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-08/msg00003.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2750.htmlnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3618nvdThird Party Advisory
- www.securityfocus.com/bid/91401nvdThird Party AdvisoryVDB Entry
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- support.apple.com/HT207170nvdThird Party Advisory
- lists.apple.com/archives/security-announce/2016/Sep/msg00006.htmlnvdBroken LinkMailing List
News mentions
0No linked articles in our index yet.