CVE-2017-11628

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e - () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e -
References () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c - () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c -
References () http://www.securityfocus.com/bid/99489 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99489 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:1296 - () https://access.redhat.com/errata/RHSA-2018:1296 -
References () https://bugs.php.net/bug.php?id=74603 - Issue Tracking, Third Party Advisory () https://bugs.php.net/bug.php?id=74603 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201709-21 - () https://security.gentoo.org/glsa/201709-21 -
References () https://security.netapp.com/advisory/ntap-20180112-0001/ - () https://security.netapp.com/advisory/ntap-20180112-0001/ -
References () https://www.debian.org/security/2018/dsa-4080 - () https://www.debian.org/security/2018/dsa-4080 -
References () https://www.debian.org/security/2018/dsa-4081 - () https://www.debian.org/security/2018/dsa-4081 -

07 Nov 2023, 02:38

Type Values Removed Values Added
References
  • {'url': 'http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c', 'name': 'http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e', 'name': 'http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e -
  • () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c -

Information

Published : 2017-07-25 23:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-11628

Mitre link : CVE-2017-11628

CVE.ORG link : CVE-2017-11628


JSON object : View

Products Affected

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer