First published: Tue Jun 27 2017(Updated: )
Fixed bug (wddx_deserialize() heap out-of-bound read via php_parse_date()). (CVE-2017-11145)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php70-php | <0:7.0.27-1.el6 | 0:7.0.27-1.el6 |
redhat/rh-php70-php | <0:7.0.27-1.el7 | 0:7.0.27-1.el7 |
PHP PHP | <=5.6.30 | |
PHP PHP | =7.0.0 | |
PHP PHP | =7.0.1 | |
PHP PHP | =7.0.2 | |
PHP PHP | =7.0.3 | |
PHP PHP | =7.0.4 | |
PHP PHP | =7.0.5 | |
PHP PHP | =7.0.6 | |
PHP PHP | =7.0.7 | |
PHP PHP | =7.0.8 | |
PHP PHP | =7.0.9 | |
PHP PHP | =7.0.10 | |
PHP PHP | =7.0.11 | |
PHP PHP | =7.0.12 | |
PHP PHP | =7.0.13 | |
PHP PHP | =7.0.14 | |
PHP PHP | =7.0.15 | |
PHP PHP | =7.0.16 | |
PHP PHP | =7.0.17 | |
PHP PHP | =7.0.18 | |
PHP PHP | =7.0.19 | |
PHP PHP | =7.0.20 | |
PHP PHP | =7.1.0 | |
PHP PHP | =7.1.1 | |
PHP PHP | =7.1.2 | |
PHP PHP | =7.1.3 | |
PHP PHP | =7.1.4 | |
PHP PHP | =7.1.5 | |
PHP PHP | =7.1.6 | |
PHP PHP | <7.0.21 | 7.0.21 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.1 | ||
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.21 | 7.0.21 |
redhat/php | <7.1.7 | 7.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this bug is CVE-2017-11145.
The severity of CVE-2017-11145 is high with a CVSS score of 7.5.
The affected software includes PHP versions before 5.6.31, 7.0.21, and 7.1.7 as well as some specific versions from Red Hat, Ubuntu, and Debian repositories.
An attacker can exploit CVE-2017-11145 by supplying malicious date strings to the date extension's timelib_meridian parsing code, which can lead to information leakage and out-of-bounds reads.
Yes, the remediation steps vary depending on the affected software version, so it is recommended to update to the fixed versions provided by the respective vendors such as Red Hat, Ubuntu, and Debian.