CVE-2017-11143
Publication date 10 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
Status
Package | Ubuntu Release | Status |
---|---|---|
php5 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.22
|
|
php7.0 | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
php7.1 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
php5 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3382-1
- PHP vulnerabilities
- 10 August 2017
- USN-3382-2
- PHP vulnerabilities
- 18 December 2017