Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow.
                
            References
                    | Link | Resource | 
|---|---|
| http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html | Mailing List Third Party Advisory | 
| http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html | Mailing List Third Party Advisory | 
| http://php.net/ChangeLog-7.php | Release Notes Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2016/04/28/2 | Mailing List Third Party Advisory | 
| https://bugs.php.net/bug.php?id=71637 | Exploit Issue Tracking Patch Vendor Advisory | 
| http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html | Mailing List Third Party Advisory | 
| http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html | Mailing List Third Party Advisory | 
| http://php.net/ChangeLog-7.php | Release Notes Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2016/04/28/2 | Mailing List Third Party Advisory | 
| https://bugs.php.net/bug.php?id=71637 | Exploit Issue Tracking Patch Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:51
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html - Mailing List, Third Party Advisory | |
| References | () http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2016/04/28/2 - Mailing List, Third Party Advisory | |
| References | () https://bugs.php.net/bug.php?id=71637 - Exploit, Issue Tracking, Patch, Vendor Advisory | 
20 Jul 2022, 16:56
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MLIST) http://www.openwall.com/lists/oss-security/2016/04/28/2 - Mailing List, Third Party Advisory | |
| References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html - Mailing List, Third Party Advisory | |
| References | (CONFIRM) http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory | |
| References | (CONFIRM) https://bugs.php.net/bug.php?id=71637 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
| References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* | |
| CWE | CWE-190 | 
Information
                Published : 2016-05-22 01:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-4346
Mitre link : CVE-2016-4346
CVE.ORG link : CVE-2016-4346
JSON object : View
Products Affected
                php
- php
 
opensuse
- leap
 - opensuse
 
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
