CVE-2017-11147CVE-2017-11147

Affected configuration(s):

cpe:/a:php:php:5.6.29
cpe:/a:php:php:7.0.0
cpe:/a:php:php:7.0.1
cpe:/a:php:php:7.0.2
cpe:/a:php:php:7.0.3
cpe:/a:php:php:7.0.4
cpe:/a:php:php:7.0.5
cpe:/a:php:php:7.0.6
cpe:/a:php:php:7.0.7
cpe:/a:php:php:7.0.8
cpe:/a:php:php:7.0.9
cpe:/a:php:php:7.0.10
cpe:/a:php:php:7.0.11
cpe:/a:php:php:7.0.12
cpe:/a:php:php:7.0.13
cpe:/a:php:php:7.0.14

Date published: 2017-07-10T10:29:00.697-04:00

Date last modified: 2017-11-02T21:29:05.497-04:00

CVSS Score: 6.4

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451

Summary: In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.