{"id":"CVE-2016-5771","details":"spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.","modified":"2026-04-16T06:16:26.578139152Z","published":"2016-08-07T10:59:19.167Z","related":["SUSE-SU-2016:1842-1","SUSE-SU-2018:0806-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3618"},{"type":"ADVISORY","url":"https://support.apple.com/HT207170"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91401"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72433"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"FIX","url":"http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1"},{"type":"FIX","url":"http://php.net/ChangeLog-5.php"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"d5747a70cf612e653b0e56dfa50efb29bbba273d"},{"introduced":"fc1df8e7a6886e29a6ed5bef3f674ac61164e847"},{"fixed":"961e562d1b7e7d67c7370022a167938641d607ea"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"fixed":"3f627e580acfdaf0595ae3b115b8bec677f203ee"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.5.37"},{"introduced":"5.6.0"},{"fixed":"5.6.23"},{"introduced":"7.0.0"},{"fixed":"7.0.8"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.23RC1","php-7.0.8RC1","php-8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5771.json","vanir_signatures":[{"digest":{"line_hashes":["172529010675807687807396361343353921974","63080092587161679693851290759915191347","92445649054574504178969508602087037098","47983572388981575197119334583777239342","49093506086661717566379834635802782751","320528347532434852589338425328485404914","182173827853381497248658603193030993074"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee","deprecated":false,"signature_type":"Line","target":{"file":"ext/spl/spl_array.c"},"id":"CVE-2016-5771-55bd4544"},{"digest":{"length":4802,"function_hash":"259753987416402141766353710983866908693"},"signature_version":"v1","source":"https://github.com/php/php-src/commit/961e562d1b7e7d67c7370022a167938641d607ea","deprecated":false,"signature_type":"Function","target":{"function":"php_wddx_push_element","file":"ext/wddx/wddx.c"},"id":"CVE-2016-5771-60a76a01"},{"digest":{"length":2442,"function_hash":"178346697772086131021134430194686741868"},"signature_version":"v1","source":"https://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee","deprecated":false,"signature_type":"Function","target":{"function":"PHP_MINIT_FUNCTION","file":"ext/spl/spl_array.c"},"id":"CVE-2016-5771-b5efc824"},{"digest":{"line_hashes":["108112416631527217460140097544647415290","19194827250221392632591492071396049436","327693491351152557693361828737983469639","213154144896593918768606924357591146913"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/php/php-src/commit/961e562d1b7e7d67c7370022a167938641d607ea","deprecated":false,"signature_type":"Line","target":{"file":"ext/wddx/wddx.c"},"id":"CVE-2016-5771-e0fbf8ee"}],"vanir_signatures_modified":"2026-04-11T04:02:22Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}