CVE-2017-11147
Published: 10 July 2017
In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
Priority
Status
Package | Release | Status |
---|---|---|
php5
Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.22)
|
|
upstream |
Released
(5.6.30)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches:
upstream: https://github.com/php/php-src/commit/e5246580a85f031e1a3b8064edbaa55c1643a451 |
||
php7.0
Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(7.0.15)
|
|
xenial |
Not vulnerable
(7.0.18-0ubuntu0.16.04.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(7.0.18-0ubuntu0.17.04.1)
|
|
Patches:
upstream: https://github.com/php/php-src/commit/e5246580a85f031e1a3b8064edbaa55c1643a451 upstream: https://github.com/php/php-src/commit/7f0de1a138a69beb7c537fd1ec84afbc91a45b19 |
||
php7.1
Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(7.1.6-2ubuntu1)
|
trusty |
Does not exist
|
|
upstream |
Released
(7.1.1)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches:
upstream: https://github.com/php/php-src/commit/e5246580a85f031e1a3b8064edbaa55c1643a451 upstream: https://github.com/php/php-src/commit/7f0de1a138a69beb7c537fd1ec84afbc91a45b19 upstream: https://github.com/php/php-src/commit/2075fb2b73c2d56c7acfb29773a2dc68b8d2f29d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |