{"id":"CVE-2016-7413","details":"Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.","modified":"2026-04-16T06:20:46.283675533Z","published":"2016-09-17T21:59:04.963Z","related":["SUSE-SU-2016:2459-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","SUSE-SU-2016:2461-1","SUSE-SU-2016:2477-1","SUSE-SU-2016:2477-2"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1036836"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-19"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93006"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72860"},{"type":"FIX","url":"https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/09/15/10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"e37064dae4a80c70405899bb591969bbe6aad9a8"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"introduced":"0"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"},{"introduced":"0"},{"last_affected":"4e1b8701573698f56e12672e4991d7e6239138d2"},{"introduced":"0"},{"last_affected":"e09845d32614a19188632f410316478fbb440ebd"},{"introduced":"0"},{"last_affected":"249a8fd9ae2324c84ede7ecfca6f6026e6d87df6"},{"introduced":"0"},{"last_affected":"734a5fca2c4731e34eca551f28be9a10ffc3f3c9"},{"introduced":"0"},{"last_affected":"fb59213fc461f079bc218abf44cb5e2b4db2182c"},{"introduced":"0"},{"last_affected":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"9d582eba7448f1495fae62b13d95d2844ce6b28a"},{"introduced":"0"},{"last_affected":"da12ca9c1ed03084e6803f5e81e46f2e0a80460a"},{"fixed":"b88393f08a558eec14964a55d3c680fe67407712"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.6.25"},{"introduced":"0"},{"last_affected":"7.0.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.0.4"},{"introduced":"0"},{"last_affected":"7.0.5"},{"introduced":"0"},{"last_affected":"7.0.6"},{"introduced":"0"},{"last_affected":"7.0.7"},{"introduced":"0"},{"last_affected":"7.0.8"},{"introduced":"0"},{"last_affected":"7.0.9"},{"introduced":"0"},{"last_affected":"7.0.10"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.25","php-5.6.25RC1","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.10","php-7.0.10RC1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1","php-7.0.3","php-7.0.4","php-7.0.4RC1","php-7.0.5","php-7.0.5RC1","php-7.0.6","php-7.0.6RC1","php-7.0.7","php-7.0.7RC1","php-7.0.8","php-7.0.8RC1","php-7.0.9","php-7.0.9RC1"],"database_specific":{"vanir_signatures_modified":"2026-04-11T05:00:48Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7413.json","vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["303830850402822176879384419743899259654","148935339921086914422688777100698283237","24078837391961220849933534822830535152","300057055468851789579619501043766968755"]},"id":"CVE-2016-7413-70d714a6","signature_version":"v1","signature_type":"Line","source":"https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712","deprecated":false,"target":{"file":"ext/wddx/wddx.c"}},{"digest":{"length":494,"function_hash":"212353708997454015791630450925367183490"},"id":"CVE-2016-7413-8b181911","signature_version":"v1","signature_type":"Function","source":"https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712","deprecated":false,"target":{"function":"wddx_stack_destroy","file":"ext/wddx/wddx.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}