[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2017-5340Date: (C)2017-01-11   (M)2024-02-22


Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
SECTRACK-1037659
BID-95371
RHSA-2018:1296
https://bugs.php.net/bug.php?id=73832
https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12
https://security.netapp.com/advisory/ntap-20180112-0001/

CPE    1
cpe:/a:php:php
CWE    1
CWE-190
OVAL    4
oval:org.secpod.oval:def:51730
oval:org.secpod.oval:def:703488
oval:org.secpod.oval:def:1600519
oval:org.secpod.oval:def:504906
...

© SecPod Technologies