Critical severity9.8NVD Advisory· Published Jul 25, 2016· Updated May 6, 2026
CVE-2016-6290
CVE-2016-6290
Description
ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.securityfocus.com/bid/92097nvdThird Party AdvisoryVDB Entry
- openwall.com/lists/oss-security/2016/07/24/2nvdMailing ListRelease Notes
- php.net/ChangeLog-5.phpnvdRelease Notes
- bugs.php.net/72562nvdIssue Tracking
- lists.apple.com/archives/security-announce/2016/Sep/msg00006.htmlnvd
- php.net/ChangeLog-7.phpnvd
- rhn.redhat.com/errata/RHSA-2016-2750.htmlnvd
- www.debian.org/security/2016/dsa-3631nvd
- www.securitytracker.com/id/1036430nvd
- security.gentoo.org/glsa/201611-22nvd
- support.apple.com/HT207170nvd
News mentions
0No linked articles in our index yet.