#VU7356 Stack-based buffer overflow in PHP


Published: 2017-07-06 | Updated: 2017-09-26

Vulnerability identifier: #VU7356

Vulnerability risk: High

CVSSv3.1:

CVE-ID: CVE-2017-11628

CWE-ID:

Exploitation vector: Network

Exploit availability:

Vulnerable software:
PHP
Universal components / Libraries / Scripting languages

Vendor: PHP Group

Description
The vulnerability allows a remote attacker to cause DoS condition or potentially execute arbitrary code.

The weakness exists due to stack buffer overflow in PHP INI parsing API 2 when handling malicious input. A remote attacker can send specially crafted data, trigger stack buffer overflow in zend_ini_do_op() that may lead to out-of-bounds write, cause the application to crash or execute arbitrary code with web server privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Update to version 7.0.21.

Vulnerable software versions

PHP: 7.0.0 - 7.0.20


Fixed software versions

CPE

External links
http://php.net/ChangeLog-7.php#7.0.21
http://bugs.php.net/bug.php?id=74603


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability