First published: Mon Jul 10 2017(Updated: )
Fixed bug (wddx parsing empty boolean tag leads to SIGSEGV). (CVE-2017-11143)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | <=5.6.30 | |
PHP PHP | <7.0.22 | 7.0.22 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.1 | ||
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.22 | 7.0.22 |
redhat/php | <7.1.8 | 7.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11143 is a vulnerability in PHP that allows attackers to crash the PHP interpreter by injecting XML for deserialization.
CVE-2017-11143 can lead to a denial of service (crashing the PHP interpreter) if an attacker is able to inject malicious XML for deserialization.
PHP versions before 5.6.31, 7.0.22, and 7.1.8 are affected by CVE-2017-11143.
To fix CVE-2017-11143, you should upgrade to PHP version 5.6.31, 7.0.22, or 7.1.8.
CVE-2017-11143 has a severity rating of 7.5 (high).