vendor:
PHP
by:
@vah_13
9.8
CVSS
CRITICAL
Memory Write
121
CWE
Product Name: PHP
Affected Version From: 5.5.2000
Affected Version To: 5.5.33
Patch Exists: YES
Related CWE: CVE-2016-3141
CPE: a:php:php:5.5.33
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-usn-2952-2/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apachemodphp-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/php-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-3141/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-3141/
Platforms Tested: Linux
2016
Invalid memory write in phar on filename with in name
This exploit allows an attacker to perform an invalid memory write in phar on a filename with in the name. The vulnerability occurs when creating a Phar object with a test file that contains a null byte in the name. By manipulating the file contents, an attacker can trigger the invalid memory write and potentially execute arbitrary code.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a patched version of PHP that includes the fix for this issue. Additionally, it is important to sanitize user input when handling file names to prevent the inclusion of null bytes.