PHP up to 5.4.44/5.5.28/5.6.12 Session Deserializer use after free
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.2 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in PHP up to 5.4.44/5.5.28/5.6.12. Impacted is an unknown function of the component Session Deserializer. Performing a manipulation results in use after free. This vulnerability is cataloged as CVE-2015-6835. Furthermore, there is an exploit available. You should upgrade the affected component.
Details
A vulnerability, which was classified as critical, was found in PHP up to 5.4.44/5.5.28/5.6.12 (Programming Language Software). This affects some unknown functionality of the component Session Deserializer. The manipulation with an unknown input leads to a use after free vulnerability. CWE is classifying the issue as CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was shared 09/03/2015 by Taoguang Chen as Version 5.6.13 as confirmed changelog entry (Website). The advisory is shared at secure.php.net. This vulnerability is uniquely identified as CVE-2015-6835 since 09/08/2015. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available.
The exploit is shared for download at exploit-db.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 86654 (Mac OS X < 10.11.1 Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family MacOS X Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 11628 (PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities).
Upgrading to version 5.4.45, 5.5.29 or 5.6.13 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Exploit-DB (38123), Tenable (86654), SecurityFocus (BID 76734†), SecurityTracker (ID 1033548†) and Vulnerability Center (SBV-52589†). The entries VDB-67396, VDB-67398, VDB-67420 and VDB-67724 are related to this item. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
- 5.4.0
- 5.4.1
- 5.4.2
- 5.4.3
- 5.4.4
- 5.4.5
- 5.4.6
- 5.4.7
- 5.4.8
- 5.4.9
- 5.4.10
- 5.4.11
- 5.4.12
- 5.4.13
- 5.4.14
- 5.4.15
- 5.4.16
- 5.4.17
- 5.4.18
- 5.4.19
- 5.4.20
- 5.4.21
- 5.4.22
- 5.4.23
- 5.4.24
- 5.4.25
- 5.4.26
- 5.4.27
- 5.4.28
- 5.4.29
- 5.4.30
- 5.4.31
- 5.4.32
- 5.4.33
- 5.4.34
- 5.4.35
- 5.4.36
- 5.4.37
- 5.4.38
- 5.4.39
- 5.4.40
- 5.4.41
- 5.4.42
- 5.4.43
- 5.4.44
- 5.5.0
- 5.5.1
- 5.5.2
- 5.5.3
- 5.5.4
- 5.5.5
- 5.5.6
- 5.5.7
- 5.5.8
- 5.5.9
- 5.5.10
- 5.5.11
- 5.5.12
- 5.5.13
- 5.5.14
- 5.5.15
- 5.5.16
- 5.5.17
- 5.5.18
- 5.5.19
- 5.5.20
- 5.5.21
- 5.5.22
- 5.5.23
- 5.5.24
- 5.5.25
- 5.5.26
- 5.5.27
- 5.5.28
- 5.6.0
- 5.6.1
- 5.6.2
- 5.6.3
- 5.6.4
- 5.6.5
- 5.6.6
- 5.6.7
- 5.6.8
- 5.6.9
- 5.6.10
- 5.6.11
- 5.6.12
License
Website
- Product: https://www.php.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.5VulDB Meta Temp Score: 8.2
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Use after freeCWE: CWE-416 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 86654
Nessus Name: Mac OS X < 10.11.1 Multiple Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 14611
OpenVAS Name: Amazon Linux Local Check: alas-2016-670
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: PHP 5.4.45/5.5.29/5.6.13
Timeline
09/03/2015 🔍09/03/2015 🔍
09/08/2015 🔍
09/08/2015 🔍
09/09/2015 🔍
09/14/2015 🔍
09/16/2015 🔍
09/16/2015 🔍
05/16/2016 🔍
01/05/2025 🔍
Sources
Product: php.orgAdvisory: Version 5.6.13
Researcher: Taoguang Chen
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-6835 (🔍)
GCVE (CVE): GCVE-0-2015-6835
GCVE (VulDB): GCVE-100-77709
OVAL: 🔍
SecurityFocus: 76734 - PHP 'php_var_unserialize()' Function Use After Free Remote Code Execution Vulnerability
SecurityTracker: 1033548
Vulnerability Center: 52589 - PHP Remote Code Execution in \x27php_var_unserialize()\x27 Function by Using a Specially Crafted Input, High
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 09/16/2015 11:27Updated: 01/05/2025 06:43
Changes: 09/16/2015 11:27 (59), 12/23/2017 13:11 (21), 06/15/2022 14:04 (3), 06/15/2022 14:10 (11), 06/15/2022 14:11 (1), 01/05/2025 06:43 (23)
Complete: 🔍
Cache ID: 216:A8A:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.