Out-of-Bounds Affecting php package, versions [,5.6.31)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PHP-2335432
  • published12 Jan 2022
  • disclosed25 Jul 2017
  • creditUnknown

Introduced: 25 Jul 2017

CVE-2017-11628  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade php to version 5.6.31 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

References

CVSS Scores

version 3.1