{"id":"CVE-2016-10159","details":"Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.","modified":"2026-05-07T01:42:58.373115Z","published":"2017-01-24T21:59:00.180Z","related":["SUSE-SU-2017:0534-1","SUSE-SU-2017:0556-1","SUSE-SU-2017:0568-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"5.6.29"},{"introduced":"7.0.0"},{"fixed":"7.0.15"}],"cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.1.0-NA"}],"cpe":"cpe:2.3:a:php:php:7.1.0:-:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"source":"DESCRIPTION","extracted_events":[{"fixed":"5.6.30"},{"introduced":"7.0.x"},{"fixed":"7.0.15"}]}]},"references":[{"type":"ADVISORY","url":"http://php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3783"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95774"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037659"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-29"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180112-0001/"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2017-04"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=73764"},{"type":"FIX","url":"https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"ca46d0acbce55019b970fcd4c1e8a10edfdded93"}],"database_specific":{"source":"REFERENCES"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10159.json","vanir_signatures":[{"source":"https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93","id":"CVE-2016-10159-c6d30f0a","signature_type":"Line","digest":{"line_hashes":["121052452896400164276001498621023313905","262168943274424758961694766712839997290","35360108606078329448889142211054414706","145313471589252137248472230406309010104","314417463545681779499062229029939122698","74004429412006798345526032305741375125","36646184072252867127774558500130006594","331527402370172640660609847974879528962"],"threshold":0.9},"target":{"file":"ext/phar/phar.c"},"signature_version":"v1","deprecated":false}],"vanir_signatures_modified":"2026-05-07T01:42:58Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}