{"id":"CVE-2016-4342","details":"ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.","modified":"2026-04-11T12:01:18.983744Z","published":"2016-05-22T01:59:16.337Z","related":["SUSE-SU-2016:1504-1","SUSE-SU-2016:1581-1","SUSE-SU-2016:1638-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.1"}]}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html"},{"type":"WEB","url":"http://php.net/ChangeLog-5.php"},{"type":"WEB","url":"http://php.net/ChangeLog-7.php"},{"type":"WEB","url":"http://www.securityfocus.com/bid/89154"},{"type":"WEB","url":"https://bugs.php.net/bug.php?id=71354"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2016/04/28/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"6c78ce66de2a9c4f872ae67b967a5c6e2a8f6c47"},{"last_affected":"fc1df8e7a6886e29a6ed5bef3f674ac61164e847"},{"last_affected":"939409d36feb09b882d521ec9ceecce6999ab199"},{"last_affected":"f94c1df85fb004bb35091da5cebe730589a409b8"},{"last_affected":"df586243a3a8367d69f22990f1246dec4bbf437a"},{"last_affected":"c37265eacdd0186cb3b0bfeb0e0104c8563807ef"},{"last_affected":"b1ffeb3a7f320549cbb1873f85f0da18e9a5a6ce"},{"last_affected":"ae15e636e2b213bf748fa0b94ca95ac96d6eae3a"},{"last_affected":"effcb5a97358f01714bd833c8063a4a7abe9dff1"},{"last_affected":"7603abbc5186e276a5a68c6ef28d1728e4a37ec4"},{"last_affected":"2610d63a482e708ba28cf8e056f47412445a6c53"},{"last_affected":"c9e5f38e5b62fb6e5b60fe0759f51ab137ae8fd6"},{"last_affected":"d8e4dcdfd617f1c1c942db63527d1d3838ede7c4"},{"last_affected":"f2722bdbc60403300a033ee8091a2da31f7c90c1"},{"last_affected":"f5751638dbd77136ce5c90e7d8bd090aa655c2a3"},{"last_affected":"2f0d051bfd43315bedfff2de3137abd2c67741a6"},{"last_affected":"8eff5afaced13c9c30337c11da4920fc1d2394ce"},{"last_affected":"cb80afc366df74ec7ab701a853407a69cc148f5d"},{"last_affected":"e808a7687ecd82ea18d6a83cb1f003a84831c0e2"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"}],"database_specific":{"cpe":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*","cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*","cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*","cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"5.5.31"},{"last_affected":"5.6.0"},{"last_affected":"5.6.1"},{"last_affected":"5.6.2"},{"last_affected":"5.6.3"},{"last_affected":"5.6.4"},{"last_affected":"5.6.5"},{"last_affected":"5.6.6"},{"last_affected":"5.6.7"},{"last_affected":"5.6.8"},{"last_affected":"5.6.9"},{"last_affected":"5.6.10"},{"last_affected":"5.6.11"},{"last_affected":"5.6.12"},{"last_affected":"5.6.13"},{"last_affected":"5.6.14"},{"last_affected":"5.6.15"},{"last_affected":"5.6.16"},{"last_affected":"5.6.17"},{"last_affected":"7.0.0"},{"last_affected":"7.0.1"},{"last_affected":"7.0.2"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.5.31","php-5.6.0","php-5.6.0RC1","php-5.6.0RC2","php-5.6.0RC3","php-5.6.0RC4","php-5.6.0alpha1","php-5.6.0alpha2","php-5.6.0alpha3","php-5.6.0beta1","php-5.6.0beta2","php-5.6.0beta3","php-5.6.0beta4","php-5.6.1","php-5.6.10","php-5.6.10RC1","php-5.6.11","php-5.6.11RC1","php-5.6.12","php-5.6.12RC1","php-5.6.13","php-5.6.13RC1","php-5.6.14","php-5.6.14RC1","php-5.6.15","php-5.6.15RC1","php-5.6.16","php-5.6.16RC1","php-5.6.17","php-5.6.17RC1","php-5.6.1RC1","php-5.6.2","php-5.6.3","php-5.6.3RC1","php-5.6.4","php-5.6.4RC1","php-5.6.5","php-5.6.5RC1","php-5.6.6","php-5.6.6RC1","php-5.6.7","php-5.6.7RC1","php-5.6.8","php-5.6.8RC1","php-5.6.9","php-5.6.9RC1","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4342.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}