{"id":"CVE-2016-5095","details":"Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.","modified":"2026-03-20T11:14:32.865474Z","published":"2016-08-07T10:59:08.460Z","related":["SUSE-SU-2016:1581-1","SUSE-SU-2016:1633-1","SUSE-SU-2016:1638-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/92144"},{"type":"WEB","url":"https://bugs.php.net/bug.php?id=72135"},{"type":"WEB","url":"https://gist.github.com/8ef775c117d84ff15185953990a28576"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3602"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/05/26/3"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-5.php"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"9d10b0109258e8ea797c8977c5932d162d6c6004"},{"introduced":"0"},{"last_affected":"8648f76bac2f78391a1539253f21d62f53d83022"},{"introduced":"0"},{"last_affected":"326ab8b147485eeb1ca023807272bc1994bcd7de"},{"introduced":"0"},{"last_affected":"dae8ff251c0cdbbb0640df8277edef050fdb8854"},{"introduced":"0"},{"last_affected":"11d102ebbcbbd008a6e50ddc65849dfcfb568da4"},{"introduced":"0"},{"last_affected":"a964242f19ad029e57a62576f04e3cbab4795d03"},{"introduced":"0"},{"last_affected":"57e698d58263edeb5e15d78e0a968298f65a439f"},{"introduced":"0"},{"last_affected":"69797e81ed9917bb199d5cdc44fce6697493e1d2"},{"introduced":"0"},{"last_affected":"939409d36feb09b882d521ec9ceecce6999ab199"},{"introduced":"0"},{"last_affected":"f94c1df85fb004bb35091da5cebe730589a409b8"},{"introduced":"0"},{"last_affected":"df586243a3a8367d69f22990f1246dec4bbf437a"},{"introduced":"0"},{"last_affected":"c37265eacdd0186cb3b0bfeb0e0104c8563807ef"},{"introduced":"0"},{"last_affected":"b1ffeb3a7f320549cbb1873f85f0da18e9a5a6ce"},{"introduced":"0"},{"last_affected":"ae15e636e2b213bf748fa0b94ca95ac96d6eae3a"},{"introduced":"0"},{"last_affected":"effcb5a97358f01714bd833c8063a4a7abe9dff1"},{"introduced":"0"},{"last_affected":"7603abbc5186e276a5a68c6ef28d1728e4a37ec4"},{"introduced":"0"},{"last_affected":"2610d63a482e708ba28cf8e056f47412445a6c53"},{"introduced":"0"},{"last_affected":"c9e5f38e5b62fb6e5b60fe0759f51ab137ae8fd6"},{"introduced":"0"},{"last_affected":"d8e4dcdfd617f1c1c942db63527d1d3838ede7c4"},{"introduced":"0"},{"last_affected":"f2722bdbc60403300a033ee8091a2da31f7c90c1"},{"introduced":"0"},{"last_affected":"f5751638dbd77136ce5c90e7d8bd090aa655c2a3"},{"introduced":"0"},{"last_affected":"2f0d051bfd43315bedfff2de3137abd2c67741a6"},{"introduced":"0"},{"last_affected":"8eff5afaced13c9c30337c11da4920fc1d2394ce"},{"introduced":"0"},{"last_affected":"cb80afc366df74ec7ab701a853407a69cc148f5d"},{"introduced":"0"},{"last_affected":"e808a7687ecd82ea18d6a83cb1f003a84831c0e2"},{"introduced":"0"},{"last_affected":"62cf13d3aa08b15107b02a0505a4f30142fa37b4"},{"introduced":"0"},{"last_affected":"2c9fcbabe8f7780c8566d9baddb5aae36fdce84b"},{"introduced":"0"},{"last_affected":"e197c9b13991e569179a709574187f9e455efc0f"},{"introduced":"0"},{"last_affected":"50a8b9527a2317ba861ad0b660ff981f69941cfd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.5.35"},{"introduced":"0"},{"last_affected":"5.6.0-alpha1"},{"introduced":"0"},{"last_affected":"5.6.0-alpha2"},{"introduced":"0"},{"last_affected":"5.6.0-alpha3"},{"introduced":"0"},{"last_affected":"5.6.0-beta1"},{"introduced":"0"},{"last_affected":"5.6.0-beta2"},{"introduced":"0"},{"last_affected":"5.6.0-beta3"},{"introduced":"0"},{"last_affected":"5.6.0-beta4"},{"introduced":"0"},{"last_affected":"5.6.1"},{"introduced":"0"},{"last_affected":"5.6.2"},{"introduced":"0"},{"last_affected":"5.6.3"},{"introduced":"0"},{"last_affected":"5.6.4"},{"introduced":"0"},{"last_affected":"5.6.5"},{"introduced":"0"},{"last_affected":"5.6.6"},{"introduced":"0"},{"last_affected":"5.6.7"},{"introduced":"0"},{"last_affected":"5.6.8"},{"introduced":"0"},{"last_affected":"5.6.9"},{"introduced":"0"},{"last_affected":"5.6.10"},{"introduced":"0"},{"last_affected":"5.6.11"},{"introduced":"0"},{"last_affected":"5.6.12"},{"introduced":"0"},{"last_affected":"5.6.13"},{"introduced":"0"},{"last_affected":"5.6.14"},{"introduced":"0"},{"last_affected":"5.6.15"},{"introduced":"0"},{"last_affected":"5.6.16"},{"introduced":"0"},{"last_affected":"5.6.17"},{"introduced":"0"},{"last_affected":"5.6.18"},{"introduced":"0"},{"last_affected":"5.6.19"},{"introduced":"0"},{"last_affected":"5.6.20"},{"introduced":"0"},{"last_affected":"5.6.21"}]}}],"versions":["NEWS","NEWS-cvs2svn","php-5.3.23RC1","php-5.3.29","php-5.3.29RC1","php-5.4.30RC1","php-5.4.32RC1","php-5.4.4RC2","php-5.5.24RC1","php-5.5.35","php-5.6.0alpha1","php-5.6.1","php-5.6.10","php-5.6.10RC1","php-5.6.11","php-5.6.11RC1","php-5.6.12","php-5.6.12RC1","php-5.6.13","php-5.6.13RC1","php-5.6.14","php-5.6.14RC1","php-5.6.15","php-5.6.15RC1","php-5.6.16","php-5.6.16RC1","php-5.6.17","php-5.6.17RC1","php-5.6.18","php-5.6.18RC1","php-5.6.19","php-5.6.19RC1","php-5.6.1RC1","php-5.6.20","php-5.6.20RC1","php-5.6.21","php-5.6.21RC1","php-5.6.3","php-5.6.3RC1","php-5.6.4","php-5.6.4RC1","php-5.6.5","php-5.6.5RC1","php-5.6.6","php-5.6.6RC1","php-5.6.7","php-5.6.7RC1","php-5.6.8","php-5.6.8RC1","php-5.6.9","php-5.6.9RC1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.6.0-alpha4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.6.0-alpha5"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5095.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}]}