{"id":"CVE-2016-5772","details":"Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.","modified":"2026-04-16T06:19:33.724421571Z","published":"2016-08-07T10:59:20.680Z","related":["SUSE-SU-2016:1842-1","SUSE-SU-2016:2013-1","SUSE-SU-2016:2080-1"],"references":[{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3618"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91398"},{"type":"ADVISORY","url":"https://support.apple.com/HT207170"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72340"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"FIX","url":"http://php.net/ChangeLog-5.php"},{"type":"FIX","url":"http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"d5747a70cf612e653b0e56dfa50efb29bbba273d"},{"introduced":"fc1df8e7a6886e29a6ed5bef3f674ac61164e847"},{"fixed":"961e562d1b7e7d67c7370022a167938641d607ea"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"fixed":"a44c89e8af7c2410f4bfc5e097be2a5d0639a60c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.5.37"},{"introduced":"5.6.0"},{"fixed":"5.6.23"},{"introduced":"7.0.0"},{"fixed":"7.0.8"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.23RC1","php-7.0.8RC1","php-8.0.0"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/php/php-src/commit/961e562d1b7e7d67c7370022a167938641d607ea","signature_type":"Function","signature_version":"v1","digest":{"function_hash":"259753987416402141766353710983866908693","length":4802},"id":"CVE-2016-5772-60a76a01","target":{"file":"ext/wddx/wddx.c","function":"php_wddx_push_element"},"deprecated":false},{"signature_type":"Function","id":"CVE-2016-5772-bf04f18e","signature_version":"v1","digest":{"function_hash":"180570257826570885917371117402157294106","length":2110},"target":{"file":"ext/wddx/wddx.c","function":"php_wddx_process_data"},"source":"https://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c","deprecated":false},{"signature_type":"Line","id":"CVE-2016-5772-e0fbf8ee","target":{"file":"ext/wddx/wddx.c"},"digest":{"line_hashes":["108112416631527217460140097544647415290","19194827250221392632591492071396049436","327693491351152557693361828737983469639","213154144896593918768606924357591146913"],"threshold":0.9},"source":"https://github.com/php/php-src/commit/961e562d1b7e7d67c7370022a167938641d607ea","signature_version":"v1","deprecated":false},{"signature_type":"Line","id":"CVE-2016-5772-fe4b66ca","target":{"file":"ext/wddx/wddx.c"},"digest":{"line_hashes":["138371237491998008842515301943039341093","5438853636735337843492742048264760460","327287158167850452439701417552007583568","78609767112690709860219252615091440765","206516277081509952429337499612038618064","256212817879242093001682295899415213645","34110307404906790365435565495275501781","37364056837223290377158685987933560788"],"threshold":0.9},"source":"https://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c","signature_version":"v1","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5772.json","vanir_signatures_modified":"2026-04-11T04:02:23Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}