Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-11628

Опубликовано: 25 июл. 2017
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpWill not fix
Red Hat Enterprise Linux 7phpWill not fix
Red Hat OpenShift Enterprise 2phpWill not fix
Red Hat Software Collectionsrh-php56-phpWill not fix
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php70-phpFixedRHSA-2018:129603.05.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-php70-phpFixedRHSA-2018:129603.05.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php70-phpFixedRHSA-2018:129603.05.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSrh-php70-phpFixedRHSA-2018:129603.05.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1475522php: Stack based 1-byte buffer over-write in zend_ini_do_op() function Zend/zend_ini_parser.c

EPSS

Процентиль: 36%
0.00146
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CVSS3: 7.8
nvd
почти 8 лет назад

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CVSS3: 7.8
debian
почти 8 лет назад

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a sta ...

CVSS3: 7.8
github
около 3 лет назад

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CVSS3: 8.8
fstec
почти 8 лет назад

Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код

EPSS

Процентиль: 36%
0.00146
Низкий

4 Medium

CVSS3

Уязвимость CVE-2017-11628