Multiple vulnerabilities in PHP



Published: 2017-09-01 | Updated: 2017-09-18
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-12932
CWE-ID CWE-416
CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
PHP
Universal components / Libraries / Scripting languages

Vendor PHP Group

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Heap use-after-free error

EUVDB-ID: #VU8137

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2017-12932

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper use of the hash API for key deletion in a situation with an invalid array size. A remote attacker can use untrusted data to trigger heap use-after-free error in ext/standard/var_unserializer.re and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

The vulnerability is addressed in the following versions: 7.0.23, 7.1.9 and 7.2.0.

Vulnerable software versions

PHP: 7.0.0 - 7.0.22, 7.1.0 - 7.1.8


CPE2.3 External links

http://bugs.php.net/bug.php?id=74103

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Deserialization of untrusted data

EUVDB-ID: #VU8488

Risk: Low

CVSSv3.1:

CVE-ID: N/A

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of the user-input within unserialize () function. A remote attacker with ability to control input data can trigger denial of service (DoS) attack.

Mitigation

Update to version 7.0.23 or 7.1.9.

Vulnerable software versions

PHP: 7.0.0 - 7.0.22, 7.1.0 - 7.1.8


CPE2.3 External links

http://bugs.php.net/bug.php?id=75054

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###