Описание
Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 5.5.9+dfsg-1ubuntu4.19 |
precise | released | 5.3.10-1ubuntu3.24 |
trusty | released | 5.5.9+dfsg-1ubuntu4.19 |
trusty/esm | not-affected | 5.5.9+dfsg-1ubuntu4.19 |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | ignored | end of life |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 7.0.8-3ubuntu2 |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 7.0.8-0ubuntu0.16.04.2 |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 7.0.9 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 0.54.2-1.1ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.54.2-1+deb7u1ubuntu0.14.04.2]] |
esm-infra/xenial | not-affected | 0.54.2-1.1ubuntu0.1 |
precise | released | 0.54.2-1+deb7u1ubuntu0.12.04.1 |
trusty | released | 0.54.2-1+deb7u1ubuntu0.14.04.2 |
trusty/esm | DNE | trusty was released [0.54.2-1+deb7u1ubuntu0.14.04.2] |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | ignored | end of life |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
Integer signedness error in the simplestring_addn function in simplest ...
Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
Уязвимость функции simplestring_addn интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3