{"id":"CVE-2016-7414","details":"The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.","modified":"2026-04-16T06:17:38.649760718Z","published":"2016-09-17T21:59:06.027Z","related":["SUSE-SU-2016:2459-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","SUSE-SU-2016:2461-1","SUSE-SU-2016:2477-1","SUSE-SU-2016:2477-2"],"references":[{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-19"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036836"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93004"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72928"},{"type":"FIX","url":"https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/09/15/10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"e37064dae4a80c70405899bb591969bbe6aad9a8"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"introduced":"0"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"},{"introduced":"0"},{"last_affected":"4e1b8701573698f56e12672e4991d7e6239138d2"},{"introduced":"0"},{"last_affected":"e09845d32614a19188632f410316478fbb440ebd"},{"introduced":"0"},{"last_affected":"249a8fd9ae2324c84ede7ecfca6f6026e6d87df6"},{"introduced":"0"},{"last_affected":"734a5fca2c4731e34eca551f28be9a10ffc3f3c9"},{"introduced":"0"},{"last_affected":"fb59213fc461f079bc218abf44cb5e2b4db2182c"},{"introduced":"0"},{"last_affected":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"9d582eba7448f1495fae62b13d95d2844ce6b28a"},{"introduced":"0"},{"last_affected":"da12ca9c1ed03084e6803f5e81e46f2e0a80460a"},{"fixed":"0bfb970f43acd1e81d11be1154805f86655f15d5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.6.25"},{"introduced":"0"},{"last_affected":"7.0.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.0.4"},{"introduced":"0"},{"last_affected":"7.0.5"},{"introduced":"0"},{"last_affected":"7.0.6"},{"introduced":"0"},{"last_affected":"7.0.7"},{"introduced":"0"},{"last_affected":"7.0.8"},{"introduced":"0"},{"last_affected":"7.0.9"},{"introduced":"0"},{"last_affected":"7.0.10"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.25","php-5.6.25RC1","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.10","php-7.0.10RC1","php-7.0.11RC1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1","php-7.0.3","php-7.0.4","php-7.0.4RC1","php-7.0.5","php-7.0.5RC1","php-7.0.6","php-7.0.6RC1","php-7.0.7","php-7.0.7RC1","php-7.0.8","php-7.0.8RC1","php-7.0.9","php-7.0.9RC1"],"database_specific":{"vanir_signatures_modified":"2026-04-11T05:00:48Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7414.json","vanir_signatures":[{"digest":{"length":5223,"function_hash":"101242370165513919491089039533970893552"},"id":"CVE-2016-7414-43943fa6","deprecated":false,"target":{"file":"ext/phar/util.c","function":"phar_verify_signature"},"signature_type":"Function","source":"https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5","signature_version":"v1"},{"digest":{"line_hashes":["244400190783885828915468846303400330131","220938297046291968895624677270232626954","217113816790544416622540442228774921754","72637125844662283035880695243814328574","164246766542830566394349227218824006821","160980979549708332661600367319968669695","247389591875603594575684201196652913762","33632015481981501695773000747706314048","139545094004363760544095452240714654415","136461186073909743546029373745291216650","262191750120340749570254217947750615443","329770936341848827278611144329266529055"],"threshold":0.9},"target":{"file":"ext/phar/util.c"},"deprecated":false,"signature_version":"v1","signature_type":"Line","source":"https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5","id":"CVE-2016-7414-b7c90076"},{"digest":{"line_hashes":["194244017137198307781582767011579174443","118184689874117657393240452738154088241","86817378469711086272257748017947586223","280630189565604860243635377343440368876"],"threshold":0.9},"target":{"file":"ext/phar/zip.c"},"id":"CVE-2016-7414-bdfe8485","signature_version":"v1","signature_type":"Line","source":"https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5","deprecated":false},{"digest":{"length":17098,"function_hash":"310861919766617533753547334896560365421"},"target":{"file":"ext/phar/zip.c","function":"phar_parse_zipfile"},"id":"CVE-2016-7414-d0b8d27b","signature_version":"v1","signature_type":"Function","source":"https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5","deprecated":false}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}