First published: Thu Nov 21 2024(Updated: )
Fixed bug (Integer overflow in the dblib quoter causing OOB writes). (CVE-2024-11236)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=8.1.0<8.1.31 | |
PHP | >=8.2.0<8.2.26 | |
PHP | >=8.3.0<8.3.14 | |
PHP | <8.1.31 | 8.1.31 |
debian/php7.4 | <=7.4.33-1+deb11u5 | 7.4.33-1+deb11u8 |
debian/php8.2 | 8.2.26-1~deb12u1 8.2.28-1~deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11236 has a high severity due to integer overflow issues leading to potential out-of-bounds writes and impact on application stability.
To fix CVE-2024-11236, upgrade PHP to versions 8.1.31, 8.2.26 or later, and 8.3.14 or later.
CVE-2024-11236 affects PHP versions 8.1.0 through 8.1.30, 8.2.0 through 8.2.25, and 8.3.0 through 8.3.13.
CVE-2024-11236 is considered critical because it can allow attackers to exploit the vulnerability through uncontrolled input.
Failing to address CVE-2024-11236 can lead to severe security risks, including application crashes and unauthorized access.