{"id":"CVE-2016-5772","details":"Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.","modified":"2026-02-24T11:15:53.218731Z","published":"2016-08-07T10:59:20.680Z","related":["MGASA-2016-0238","SUSE-SU-2016:1842-1","SUSE-SU-2016:2013-1","SUSE-SU-2016:2080-1"],"references":[{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"ADVISORY","url":"http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3618"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91398"},{"type":"ADVISORY","url":"https://bugs.php.net/bug.php?id=72340"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"ADVISORY","url":"https://support.apple.com/HT207170"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72340"},{"type":"FIX","url":"http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1"},{"type":"FIX","url":"http://php.net/ChangeLog-5.php"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"EVIDENCE","url":"https://bugs.php.net/bug.php?id=72340"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"a44c89e8af7c2410f4bfc5e097be2a5d0639a60c"}]}],"versions":["NEWS","NEWS-cvs2svn","php-5.3.23RC1","php-5.3.29","php-5.3.29RC1","php-5.4.30RC1","php-5.4.32RC1","php-5.4.4RC2","php-5.5.24RC1"],"database_specific":{"vanir_signatures":[{"id":"CVE-2016-5772-bf04f18e","target":{"function":"php_wddx_process_data","file":"ext/wddx/wddx.c"},"deprecated":false,"signature_type":"Function","digest":{"function_hash":"180570257826570885917371117402157294106","length":2110},"source":"https://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c","signature_version":"v1"},{"id":"CVE-2016-5772-fe4b66ca","target":{"file":"ext/wddx/wddx.c"},"deprecated":false,"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["138371237491998008842515301943039341093","5438853636735337843492742048264760460","327287158167850452439701417552007583568","78609767112690709860219252615091440765","206516277081509952429337499612038618064","256212817879242093001682295899415213645","34110307404906790365435565495275501781","37364056837223290377158685987933560788"]},"source":"https://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c","signature_version":"v1"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5772.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}