CVE-2017-12932

ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.21:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.22:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.8:*:*:*:*:*:*:*

History

21 Nov 2024, 03:10

Type Values Removed Values Added
References () http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory () http://php.net/ChangeLog-7.php - Release Notes, Vendor Advisory
References () http://www.securityfocus.com/bid/100427 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100427 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:1296 - () https://access.redhat.com/errata/RHSA-2018:1296 -
References () https://access.redhat.com/errata/RHSA-2019:2519 - () https://access.redhat.com/errata/RHSA-2019:2519 -
References () https://bugs.php.net/bug.php?id=74103 - Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=74103 - Issue Tracking, Vendor Advisory
References () https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 - Patch, Third Party Advisory () https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201709-21 - () https://security.gentoo.org/glsa/201709-21 -
References () https://security.netapp.com/advisory/ntap-20180112-0001/ - () https://security.netapp.com/advisory/ntap-20180112-0001/ -
References () https://www.debian.org/security/2018/dsa-4080 - () https://www.debian.org/security/2018/dsa-4080 -

Information

Published : 2017-08-18 03:29

Updated : 2024-11-21 03:10


NVD link : CVE-2017-12932

Mitre link : CVE-2017-12932

CVE.ORG link : CVE-2017-12932


JSON object : View

Products Affected

php

  • php
CWE
CWE-416

Use After Free