{"id":"CVE-2016-5773","details":"php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.","modified":"2026-05-06T23:15:36.193748Z","published":"2016-08-07T10:59:21.650Z","related":["SUSE-SU-2016:2975-1","SUSE-SU-2018:0806-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"5.5.36"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-alpha1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-alpha2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-alpha3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-alpha4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-alpha5"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-beta1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-beta2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-beta3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.0-beta4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.11"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.12"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.13"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.14"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.15"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.16"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.17"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.18"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.19"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.20"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.20:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.21"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.21:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.22"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.22:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.23"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.23:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.5"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.6"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.7"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.8"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.6.9"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.5"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.6"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0.7"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"5.5.37"},{"introduced":"5.6.x"},{"fixed":"5.6.23"},{"introduced":"7.x"},{"fixed":"7.0.8"}],"source":"DESCRIPTION"}]},"references":[{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91397"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"WEB","url":"https://support.apple.com/HT207170"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3618"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"FIX","url":"http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1"},{"type":"FIX","url":"http://php.net/ChangeLog-5.php"},{"type":"FIX","url":"http://php.net/ChangeLog-7.php"},{"type":"EVIDENCE","url":"https://bugs.php.net/bug.php?id=72434"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"f6aef68089221c5ea047d4a74224ee3deead99a6"}],"database_specific":{"source":"REFERENCES"}}],"database_specific":{"vanir_signatures":[{"id":"CVE-2016-5773-0450c870","deprecated":false,"source":"https://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6","signature_type":"Line","target":{"file":"ext/zip/php_zip.c"},"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["336596916085203698350057541604668175738","312605460516307546358655968823750311776","202289105112210415793622660399889669894","2659789645517324669066205643089415753","44597108971789535196204357436920634856","23647072536535761014923467067741495308"]}},{"id":"CVE-2016-5773-76d74a1e","deprecated":false,"source":"https://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6","signature_type":"Function","target":{"file":"ext/zip/php_zip.c","function":"PHP_MINIT_FUNCTION"},"signature_version":"v1","digest":{"function_hash":"119329149946522731800414006082504987445","length":3706}}],"vanir_signatures_modified":"2026-05-06T23:15:36Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5773.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}