First published: Thu Mar 16 2017(Updated: )
Fixed bug (Performance problem with processing large post request). (CVE-2017-11142)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php5 | ||
debian/php7.0 | ||
debian/php7.1 | ||
PHP | <7.0.17 | 7.0.17 |
PHP | <=5.6.30 | |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 | |
PHP | =7.0.8 | |
PHP | =7.0.9 | |
PHP | =7.0.10 | |
PHP | =7.0.11 | |
PHP | =7.0.12 | |
PHP | =7.0.13 | |
PHP | =7.0.14 | |
PHP | =7.0.15 | |
PHP | =7.0.16 | |
PHP | =7.1.0 | |
PHP | =7.1.1 | |
PHP | =7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11142 has a severity rating of Medium due to its potential for Denial of Service attacks.
To fix CVE-2017-11142, upgrade your PHP version to 5.6.31, 7.0.17, or 7.1.3 or later.
CVE-2017-11142 is a Denial of Service vulnerability caused by excessive CPU consumption due to long form variables.
CVE-2017-11142 affects PHP versions prior to 5.6.31, 7.0.17, and 7.1.3.
Yes, CVE-2017-11142 can be exploited remotely by attackers sending crafted long form variables.