CVE-2017-11143
Published: 10 July 2017
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
Notes
Author | Note |
---|---|
mdeslaur | only affected 5.6 |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.22)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
artful |
Does not exist
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 upstream: http://git.php.net/?p=php-src.git;a=commit;h=f269cdcd4f76accbecd03884f327cffb9a7f1ca9 |
||
php7.0 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Does not exist
|
|
xenial |
Not vulnerable
(5.6 only)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(5.6 only)
|
|
artful |
Does not exist
|
|
php7.1 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
artful |
Not vulnerable
(5.6 only)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |