Out-of-Bounds Affecting php56-mssql package, versions <0:5.6.35-1.137.amzn1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-PHP56MSSQL-1712337
- published 27 Sep 2021
- disclosed 1 Mar 2018
Introduced: 1 Mar 2018
CVE-2018-7584 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2018.03 php56-mssql to version 0:5.6.35-1.137.amzn1 or higher.
This issue was patched in ALAS-2018-988.
NVD Description
Note: Versions mentioned in the description apply only to the upstream php56-mssql package and not the php56-mssql package as distributed by Amazon-Linux.
See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
References
- http://www.securityfocus.com/bid/103204
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
- https://www.debian.org/security/2018/dsa-4240
- https://www.exploit-db.com/exploits/44846/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:2519
- http://www.securitytracker.com/id/1041607
- https://usn.ubuntu.com/3600-1/
- https://usn.ubuntu.com/3600-2/