CVE-2018-14884
Published: 3 August 2018
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Notes
Author | Note |
---|---|
sbeattie | PEAR issues should go against php-pear as of xenial |
ratliff | issue introduced in 7.0.16, 7.1.2, 7.2-dev per upstream bug |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Not vulnerable
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php7.0 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(7.0.27)
|
|
xenial |
Not vulnerable
(7.0.30-0ubuntu0.16.04.1)
|
|
php7.2 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(7.2.7-0ubuntu0.18.04.2)
|
trusty |
Does not exist
|
|
upstream |
Released
(7.2.1)
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |