CVE-2017-11628
Publication date 25 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
Status
Package | Ubuntu Release | Status |
---|---|---|
php5 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.22
|
|
php7.0 | ||
16.04 LTS xenial |
Fixed 7.0.22-0ubuntu0.16.04.1
|
|
14.04 LTS trusty | Not in release | |
php7.1 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3382-1
- PHP vulnerabilities
- 10 August 2017
- USN-3382-2
- PHP vulnerabilities
- 18 December 2017