Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-14180

Опубликовано: 27 дек. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.

A flaw was found in PHP. When the PDO (PHP Data Objects) PostgreSQL driver is configured with PDO::ATTR_EMULATE_PREPARES enabled, a remote attacker can exploit a vulnerability by providing an invalid character sequence within a prepared statement parameter. This can cause a null pointer dereference, leading to a server crash. The primary impact is a Denial of Service (DoS), affecting the availability of the target server.

Отчет

This vulnerability is rated Important for Red Hat because it can lead to a Denial of Service in PHP applications utilizing the PDO PostgreSQL driver. Exploitation requires the PDO::ATTR_EMULATE_PREPARES option to be explicitly enabled, allowing a remote attacker to crash the server by providing a specially crafted invalid character sequence in a prepared statement parameter.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10php8.4Affected
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpNot affected
Red Hat Enterprise Linux 8php:7.4/phpNot affected
Red Hat Enterprise Linux 9phpNot affected
Red Hat OpenShift Dev Spacesdevspaces/code-rhel9Not affected
Red Hat OpenShift Dev Spacesdevspaces-tech-preview/idea-rhel9Will not fix
Red Hat Enterprise Linux 10phpFixedRHSA-2026:162802.02.2026
Red Hat Enterprise Linux 10.0 Extended Update SupportphpFixedRHSA-2026:118526.01.2026
Red Hat Enterprise Linux 8phpFixedRHSA-2026:141227.01.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2425627php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement

EPSS

Процентиль: 10%
0.00034
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.

CVSS3: 7.5
nvd
3 месяца назад

In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.

CVSS3: 5.9
msrc
3 месяца назад

NULL Pointer Dereference in PDO quoting

CVSS3: 7.5
debian
3 месяца назад

In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before ...

github
3 месяца назад

NULL Pointer Dereference in PDO quoting

EPSS

Процентиль: 10%
0.00034
Низкий

7.5 High

CVSS3