CVE-2017-11147

In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 - () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 -
References () http://openwall.com/lists/oss-security/2017/07/10/6 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2017/07/10/6 - Mailing List, Patch, Third Party Advisory
References () http://php.net/ChangeLog-5.php - Release Notes, Vendor Advisory () http://php.net/ChangeLog-5.php - Release Notes, Vendor Advisory
References () http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory () http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory
References () http://www.securityfocus.com/bid/99607 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99607 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:1296 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1296 - Third Party Advisory
References () https://bugs.php.net/bug.php?id=73773 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=73773 - Exploit, Issue Tracking, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20180112-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180112-0001/ - Third Party Advisory
References () https://www.tenable.com/security/tns-2017-12 - Third Party Advisory () https://www.tenable.com/security/tns-2017-12 - Third Party Advisory

07 Nov 2023, 02:38

Type Values Removed Values Added
References
  • {'url': 'http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451', 'name': 'http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451', 'tags': ['Broken Link', 'Mailing List', 'Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 -

Information

Published : 2017-07-10 14:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11147

Mitre link : CVE-2017-11147

CVE.ORG link : CVE-2017-11147


JSON object : View

Products Affected

php

  • php

netapp

  • clustered_data_ontap
CWE
CWE-125

Out-of-bounds Read