{"id":"CVE-2016-7417","details":"ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.","modified":"2026-04-11T05:00:47.569741Z","published":"2016-09-17T21:59:09.573Z","related":["MGASA-2016-0319","SUSE-SU-2016:2459-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","SUSE-SU-2016:2461-1","SUSE-SU-2016:2477-1","SUSE-SU-2016:2477-2"],"references":[{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-19"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036836"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93007"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=73029"},{"type":"FIX","url":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/09/15/10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"e37064dae4a80c70405899bb591969bbe6aad9a8"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"introduced":"0"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"},{"introduced":"0"},{"last_affected":"4e1b8701573698f56e12672e4991d7e6239138d2"},{"introduced":"0"},{"last_affected":"e09845d32614a19188632f410316478fbb440ebd"},{"introduced":"0"},{"last_affected":"249a8fd9ae2324c84ede7ecfca6f6026e6d87df6"},{"introduced":"0"},{"last_affected":"734a5fca2c4731e34eca551f28be9a10ffc3f3c9"},{"introduced":"0"},{"last_affected":"fb59213fc461f079bc218abf44cb5e2b4db2182c"},{"introduced":"0"},{"last_affected":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"9d582eba7448f1495fae62b13d95d2844ce6b28a"},{"introduced":"0"},{"last_affected":"da12ca9c1ed03084e6803f5e81e46f2e0a80460a"},{"fixed":"ecb7f58a069be0dec4a6131b6351a761f808f22e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.6.25"},{"introduced":"0"},{"last_affected":"7.0.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.0.4"},{"introduced":"0"},{"last_affected":"7.0.5"},{"introduced":"0"},{"last_affected":"7.0.6"},{"introduced":"0"},{"last_affected":"7.0.7"},{"introduced":"0"},{"last_affected":"7.0.8"},{"introduced":"0"},{"last_affected":"7.0.9"},{"introduced":"0"},{"last_affected":"7.0.10"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.25","php-5.6.25RC1","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.10","php-7.0.10RC1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1","php-7.0.3","php-7.0.4","php-7.0.4RC1","php-7.0.5","php-7.0.5RC1","php-7.0.6","php-7.0.6RC1","php-7.0.7","php-7.0.7RC1","php-7.0.8","php-7.0.8RC1","php-7.0.9","php-7.0.9RC1"],"database_specific":{"vanir_signatures_modified":"2026-04-11T05:00:47Z","vanir_signatures":[{"target":{"file":"ext/spl/spl_array.c","function":"spl_array_get_dimension_ptr_ptr"},"id":"CVE-2016-7417-095ecdd9","source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","signature_version":"v1","deprecated":false,"signature_type":"Function","digest":{"length":2221,"function_hash":"69361654777367811429259649189470587793"}},{"target":{"file":"ext/spl/spl_array.c","function":"SPL_METHOD"},"id":"CVE-2016-7417-4686c884","source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","signature_version":"v1","deprecated":false,"signature_type":"Function","digest":{"length":2242,"function_hash":"246905147912979810497061197420130037929"}},{"target":{"file":"ext/spl/spl_array.c"},"id":"CVE-2016-7417-7a48b571","source":"https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e","signature_version":"v1","deprecated":false,"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["266952166830915838201271051994753130715","207964066635493323642699902541850122321","5038839080791670529398891548668859066","24288029030073466103399865881525124107","88817205020501499550056928229111185711","257461891663215117017180759178269265320","164834675769871618608288792068169801782","16319034179528976894643980293053751032","142509527067809101064086982292036481087","17804188571802942185884872333072458209","89590806254053423398901816246695819240","40054267297084512056912605186284558878","252539200488850829855380404368122843938","192359760140051159435287622956306406946","62831633385099930540696211894894254619","20968863528423225604143902079584380735"]}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7417.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}