Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-11235

Опубликовано: 04 апр. 2025
Источник: debian

Описание

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php8.4fixed8.4.5-1package

Примечания

  • https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477

Связанные уязвимости

CVSS3: 8.1
ubuntu
10 месяцев назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

CVSS3: 8.1
redhat
10 месяцев назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

CVSS3: 8.1
nvd
10 месяцев назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

msrc
5 месяцев назад

Reference counting in php_request_shutdown causes Use-After-Free

github
11 месяцев назад

Reference counting in php_request_shutdown causes Use-After-Free