First published: Mon Feb 01 2021(Updated: )
Fixed bug (Null Dereference in SoapClient). (CVE-2021-21702)
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
<8.0.2 | 8.0.2 | |
PHP PHP | >=7.3.0<7.3.27 | |
PHP PHP | >=7.4.0<7.4.15 | |
PHP PHP | >=8.0.0<8.0.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
NetApp Clustered Data ONTAP | ||
Oracle Communications Diameter Signaling Router | >=8.0.0<=8.5.0 | |
debian/php7.3 | 7.3.31-1~deb10u1 7.3.31-1~deb10u5 | |
debian/php7.4 | 7.4.33-1+deb11u4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this bug is CVE-2021-21702.
The title of this bug is 'Fixed bug (Null Dereference in SoapClient). (CVE-2021-21702)'
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
The severity of CVE-2021-21702 is high with a CVSS score of 7.5.
To fix CVE-2021-21702, update PHP to version 8.0.2 if you are using PHP 8.0.x, and update to the latest available versions if you are using PHP 7.3.x or 7.4.x.
You can find more information about CVE-2021-21702 at the following references: [link1], [link2], [link3].