Buffer overflow in the HTTP URL parsing functions in pecl_http before 3.0.1 might allow remote attackers to execute arbitrary code via non-printable characters in a URL.
http://www.openwall.com/lists/oss-security/2016/06/29/4
http://www.openwall.com/lists/oss-security/2016/06/29/1
https://security.netapp.com/advisory/ntap-20180112-0001/
https://security.gentoo.org/glsa/201612-17
https://pecl.php.net/package/pecl_http/3.0.1
https://github.com/m6w6/ext-http/commit/3724cd76a28be1d6049b5537232e97ac
http://www.securityfocus.com/bid/95863
Source: Mitre, NVD
Published: 2017-01-23
Updated: 2025-04-20
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.0506