HTTP: PHP unserialize Call SPL Object Memory Corruption

A memory corruption vulnerability exists in PHP. The vulnerability is due to type confusion in the unserialize() function. A successful attack can allow arbitrary code execution in the context of the PHP application.

Extended Description

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

Affected Products

Php php

References

CVE: CVE-2014-3515

Short Name
HTTP:PHP:SPL-OBJECT-UNSERIALIZE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2014-3515 Call Corruption Memory Object PHP SPL unserialize
Release Date
09/11/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Php

Debian

CVSS Score

7.5

Found a potential security threat?