A use-after-free flaw was found in the way PHP's unserialize() function processed data. If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | php54 | 2015-02-11 19:34 | ALAS-2015-475 |
Amazon Linux 1 | php54 | 2015-04-15 21:49 | ALAS-2015-506 |
Amazon Linux 1 | php55 | 2015-02-11 19:33 | ALAS-2015-474 |
Amazon Linux 1 | php55 | 2015-04-15 21:49 | ALAS-2015-507 |
Amazon Linux 1 | php56 | 2015-04-15 21:50 | ALAS-2015-508 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
NVD | CVSSv2 | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |