First published: Fri Nov 17 2017(Updated: )
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
redhat/php | <7.0.27 | 7.0.27 |
redhat/php | <7.1.13 | 7.1.13 |
redhat/php | <7.2.1 | 7.2.1 |
PHP | <7.0.27 | 7.0.27 |
PHP | >=7.0.0<7.0.27 | |
PHP | >=7.1.0<7.1.13 | |
PHP | >=7.2.0<7.2.1 | |
NetApp Storage Automation Store |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14884 has a medium severity rating due to the potential for a segmentation fault leading to application crashes.
To fix CVE-2018-14884, upgrade to PHP version 7.0.27, 7.1.13, or 7.2.1 or later.
PHP versions prior to 7.0.27, 7.1.13, and 7.2.1 are affected by CVE-2018-14884.
The vulnerability in CVE-2018-14884 is due to improper parsing of HTTP response headers that can result in a NULL value being mishandled.
CVE-2018-14884 is not considered a remote exploit vulnerability as it leads to local application crashes instead.