Heap-based buffer overflow vulnerability in xmlrpc-epi through 0.54.2 allows remote attackers to cause denial of service or execute arbitrary code via a long argument to xmlrpc_encode_request function in PHP.

Heap-based buffer overflow vulnerability in xmlrpc-epi through 0.54.2 allows remote attackers to cause denial of service or execute arbitrary code via a long argument to xmlrpc_encode_request function in PHP.

CVE-2016-6296 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.

Learn more about our Web Application Penetration Testing UK.