PHP Use-After-Free Remote Code EXecution Vulnerability - Jan15

Summary
This host is installed with PHP and is prone to use-after-free vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code via a crafted unserialize call. Impact Level: Application
Solution
Upgrade to PHP version 5.4.36 or 5.5.20 or 5.6.4 or later
Insight
The flaw is due to Use-after-free vulnerability in the process_nested_data function in ext/standard/var _unserializer.re in PHP.
Affected
PHP versions 5.4.x before 5.4.36, 5.5.x before 5.5.20 and 5.6.x before 5.6.4
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References