PatchSiren cyber security CVE debrief
CVE-2016-5873 PHP CVE debrief
CVE-2016-5873 is a critical memory-corruption issue in the pecl_http HTTP URL parsing functions. A remote attacker can trigger a buffer overflow by supplying crafted URLs containing non-printable characters, which can lead to arbitrary code execution on affected systems.
- Vendor
- PHP
- Product
- CVE-2016-5873
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Organizations that use the pecl_http PHP extension, especially internet-facing applications or services that accept and parse user-controlled URLs. Security teams responsible for PHP package inventories, Linux distro packages, and embedded application stacks should treat this as a high-priority upgrade item.
Technical summary
The vulnerability is a CWE-119 buffer overflow in pecl_http’s URL parsing logic. NVD rates it CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a remotely reachable issue with no privileges or user interaction required. The supplied description says the flaw can be triggered with non-printable characters in a URL, and the vendor references point to a fix released in pecl_http 3.0.1.
Defensive priority
Immediate. This is a remotely exploitable critical issue with full CIA impact in NVD scoring, so affected deployments should be upgraded or otherwise remediated as soon as possible.
Recommended defensive actions
- Upgrade pecl_http to 3.0.1 or later.
- Inventory servers and applications that include the pecl_http extension, including packaged and bundled deployments.
- Apply the vendor or distribution update path that delivers the fixed release, and verify the installed version after patching.
- If you cannot upgrade immediately, disable or remove the extension from exposed systems until remediation is complete.
- Validate that security scans and package management processes check for pecl_http specifically, not only the PHP runtime.
Evidence notes
The CVE description states that pecl_http before 3.0.1 contains a buffer overflow in HTTP URL parsing functions that may allow arbitrary code execution via non-printable characters in a URL. The NVD record assigns CVSS 3.0 9.8 and CWE-119, and lists pecl_http versions up to 3.0.1 in the vulnerable CPE criteria. The supplied references include upstream patch material and the pecl_http 3.0.1 release notes, which support 3.0.1 as the remediation release.
Official resources
-
CVE-2016-5873 CVE record
CVE.org
-
CVE-2016-5873 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Exploit, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
- Source reference
The CVE record was published on 2017-01-23. The supplied reference corpus also includes upstream patch and advisory references dated 2016-06-29, showing prior vendor discussion and remediation context.