CVE-2017-11628CVE-2017-11628

Affected configuration(s):

cpe:/a:php:php:5.6.30
cpe:/a:php:php:7.0.0
cpe:/a:php:php:7.0.1
cpe:/a:php:php:7.0.2
cpe:/a:php:php:7.0.3
cpe:/a:php:php:7.0.4
cpe:/a:php:php:7.0.5
cpe:/a:php:php:7.0.6
cpe:/a:php:php:7.0.7
cpe:/a:php:php:7.0.8
cpe:/a:php:php:7.0.9
cpe:/a:php:php:7.0.10
cpe:/a:php:php:7.0.11
cpe:/a:php:php:7.0.12
cpe:/a:php:php:7.0.13
cpe:/a:php:php:7.0.14
cpe:/a:php:php:7.0.15
cpe:/a:php:php:7.0.16
cpe:/a:php:php:7.0.17
cpe:/a:php:php:7.0.18
cpe:/a:php:php:7.0.19
cpe:/a:php:php:7.0.20
cpe:/a:php:php:7.1.0
cpe:/a:php:php:7.1.1
cpe:/a:php:php:7.1.2
cpe:/a:php:php:7.1.3
cpe:/a:php:php:7.1.4
cpe:/a:php:php:7.1.5
cpe:/a:php:php:7.1.6

Date published: 2017-07-25T19:29:00.497-04:00

Date last modified: 2017-09-25T21:29:02.757-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e

Summary: In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system’s php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.