{"id":"CVE-2016-7417","details":"ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.","modified":"2026-04-16T01:38:12.248338717Z","published":"2016-09-17T21:59:09.573Z","related":["SUSE-SU-2016:2459-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","SUSE-SU-2016:2461-1","SUSE-SU-2016:2477-1","SUSE-SU-2016:2477-2"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/93007"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036836"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-19"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=73029"},{"type":"REPORT","url":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1"},{"type":"FIX","url":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/09/15/10"},{"type":"EVIDENCE","url":"https://bugs.php.net/bug.php?id=73029"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"ecb7f58a069be0dec4a6131b6351a761f808f22e"}]}],"versions":["NEWS","NEWS-cvs2svn","php-5.3.23RC1","php-5.3.29","php-5.3.29RC1","php-5.4.30RC1","php-5.4.32RC1","php-5.4.4RC2","php-5.5.24RC1","php-5.6.18RC1","php-5.6.19RC1","php-5.6.22RC1","php-5.6.23RC1","php-5.6.24RC1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7417.json","vanir_signatures":[{"source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","digest":{"length":2221,"function_hash":"69361654777367811429259649189470587793"},"id":"CVE-2016-7417-095ecdd9","signature_type":"Function","signature_version":"v1","target":{"function":"spl_array_get_dimension_ptr_ptr","file":"ext/spl/spl_array.c"},"deprecated":false},{"source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","signature_type":"Function","id":"CVE-2016-7417-4686c884","digest":{"length":2242,"function_hash":"246905147912979810497061197420130037929"},"signature_version":"v1","target":{"function":"SPL_METHOD","file":"ext/spl/spl_array.c"},"deprecated":false},{"source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","signature_type":"Line","id":"CVE-2016-7417-7a48b571","digest":{"threshold":0.9,"line_hashes":["266952166830915838201271051994753130715","207964066635493323642699902541850122321","5038839080791670529398891548668859066","24288029030073466103399865881525124107","88817205020501499550056928229111185711","257461891663215117017180759178269265320","164834675769871618608288792068169801782","16319034179528976894643980293053751032","142509527067809101064086982292036481087","17804188571802942185884872333072458209","89590806254053423398901816246695819240","40054267297084512056912605186284558878","252539200488850829855380404368122843938","192359760140051159435287622956306406946","62831633385099930540696211894894254619","20968863528423225604143902079584380735"]},"signature_version":"v1","target":{"file":"ext/spl/spl_array.c"},"deprecated":false}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}