{"id":"CVE-2016-4473","details":"/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code.  NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.","modified":"2026-04-11T12:04:10.974385Z","published":"2017-06-08T20:29:00.217Z","related":["SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*","extracted_events":[{"last_affected":"5.6.0-alpha4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*","extracted_events":[{"last_affected":"5.6.0-alpha5"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:suse:linux_enterprise_module_for_web_scripting:12:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","extracted_events":[{"last_affected":"12-sp1"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98999"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347772"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"8648f76bac2f78391a1539253f21d62f53d83022"},{"last_affected":"326ab8b147485eeb1ca023807272bc1994bcd7de"},{"last_affected":"dae8ff251c0cdbbb0640df8277edef050fdb8854"},{"last_affected":"11d102ebbcbbd008a6e50ddc65849dfcfb568da4"},{"last_affected":"a964242f19ad029e57a62576f04e3cbab4795d03"},{"last_affected":"57e698d58263edeb5e15d78e0a968298f65a439f"},{"last_affected":"69797e81ed9917bb199d5cdc44fce6697493e1d2"},{"last_affected":"939409d36feb09b882d521ec9ceecce6999ab199"},{"last_affected":"f94c1df85fb004bb35091da5cebe730589a409b8"},{"last_affected":"df586243a3a8367d69f22990f1246dec4bbf437a"},{"last_affected":"c37265eacdd0186cb3b0bfeb0e0104c8563807ef"},{"last_affected":"b1ffeb3a7f320549cbb1873f85f0da18e9a5a6ce"},{"last_affected":"ae15e636e2b213bf748fa0b94ca95ac96d6eae3a"},{"last_affected":"effcb5a97358f01714bd833c8063a4a7abe9dff1"},{"last_affected":"7603abbc5186e276a5a68c6ef28d1728e4a37ec4"},{"last_affected":"2610d63a482e708ba28cf8e056f47412445a6c53"},{"last_affected":"c9e5f38e5b62fb6e5b60fe0759f51ab137ae8fd6"},{"last_affected":"d8e4dcdfd617f1c1c942db63527d1d3838ede7c4"},{"last_affected":"f2722bdbc60403300a033ee8091a2da31f7c90c1"},{"last_affected":"f5751638dbd77136ce5c90e7d8bd090aa655c2a3"},{"last_affected":"2f0d051bfd43315bedfff2de3137abd2c67741a6"},{"last_affected":"8eff5afaced13c9c30337c11da4920fc1d2394ce"},{"last_affected":"cb80afc366df74ec7ab701a853407a69cc148f5d"},{"last_affected":"e808a7687ecd82ea18d6a83cb1f003a84831c0e2"},{"last_affected":"62cf13d3aa08b15107b02a0505a4f30142fa37b4"},{"last_affected":"2c9fcbabe8f7780c8566d9baddb5aae36fdce84b"},{"last_affected":"e197c9b13991e569179a709574187f9e455efc0f"},{"last_affected":"50a8b9527a2317ba861ad0b660ff981f69941cfd"},{"last_affected":"23bf3f418817f80991071ec413a0f1b97481cb88"},{"last_affected":"fb59213fc461f079bc218abf44cb5e2b4db2182c"}],"database_specific":{"cpe":["cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.20:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.21:*:*:*:*:*:*:*","cpe:2.3:a:php:php:5.6.22:*:*:*:*:*:*:*","cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"5.6.0-alpha1"},{"last_affected":"5.6.0-alpha2"},{"last_affected":"5.6.0-alpha3"},{"last_affected":"5.6.0-beta1"},{"last_affected":"5.6.0-beta2"},{"last_affected":"5.6.0-beta3"},{"last_affected":"5.6.0-beta4"},{"last_affected":"5.6.1"},{"last_affected":"5.6.2"},{"last_affected":"5.6.3"},{"last_affected":"5.6.4"},{"last_affected":"5.6.5"},{"last_affected":"5.6.6"},{"last_affected":"5.6.7"},{"last_affected":"5.6.8"},{"last_affected":"5.6.9"},{"last_affected":"5.6.10"},{"last_affected":"5.6.11"},{"last_affected":"5.6.12"},{"last_affected":"5.6.13"},{"last_affected":"5.6.14"},{"last_affected":"5.6.15"},{"last_affected":"5.6.16"},{"last_affected":"5.6.17"},{"last_affected":"5.6.18"},{"last_affected":"5.6.19"},{"last_affected":"5.6.20"},{"last_affected":"5.6.21"},{"last_affected":"5.6.22"},{"last_affected":"7.0.7"}],"source":"CPE_FIELD"}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.0alpha1","php-5.6.0alpha2","php-5.6.0alpha3","php-5.6.0beta1","php-5.6.0beta2","php-5.6.0beta3","php-5.6.0beta4","php-5.6.1","php-5.6.10","php-5.6.10RC1","php-5.6.11","php-5.6.11RC1","php-5.6.12","php-5.6.12RC1","php-5.6.13","php-5.6.13RC1","php-5.6.14","php-5.6.14RC1","php-5.6.15","php-5.6.15RC1","php-5.6.16","php-5.6.16RC1","php-5.6.17","php-5.6.17RC1","php-5.6.18","php-5.6.19","php-5.6.19RC1","php-5.6.1RC1","php-5.6.2","php-5.6.20","php-5.6.20RC1","php-5.6.21","php-5.6.21RC1","php-5.6.22","php-5.6.22RC1","php-5.6.3","php-5.6.3RC1","php-5.6.4","php-5.6.4RC1","php-5.6.5","php-5.6.5RC1","php-5.6.6","php-5.6.6RC1","php-5.6.7","php-5.6.7RC1","php-5.6.8","php-5.6.8RC1","php-5.6.9","php-5.6.9RC1","php-7.0.7","php-7.0.7RC1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4473.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}