First published: Thu Jan 19 2017(Updated: )
Fixed bug (Seg fault when loading hostile phar). (CVE-2017-11147)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | <5.6.30 | |
PHP PHP | >=7.0.0<7.0.15 | |
PHP PHP | >=7.1.0<7.1.1 | |
NetApp Clustered Data ONTAP | ||
PHP PHP | <7.0.15 | 7.0.15 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.1 | ||
redhat/php | <5.6.30 | 5.6.30 |
redhat/php | <7.0.15 | 7.0.15 |
redhat/php | <7.1.1 | 7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11147 is a vulnerability in PHP that allows attackers to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the PHAR archive handler.
The severity of CVE-2017-11147 is critical (9.1).
PHP versions before 5.6.30 and 7.x before 7.0.15 are affected by CVE-2017-11147.
To fix CVE-2017-11147, upgrade your PHP installation to version 5.6.30 or 7.0.15 or later.
You can find more information about CVE-2017-11147 at the following references: [1] https://bugs.php.net/bug.php?id=73773, [2] http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451, [3] https://access.redhat.com/security/cve/CVE-2016-10159.