CVE-2017-11147

critical

Description

In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.

References

https://bugs.php.net/bug.php?id=73773

http://php.net/ChangeLog-7.php

http://php.net/ChangeLog-5.php

http://openwall.com/lists/oss-security/2017/07/10/6

http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451

http://www.securityfocus.com/bid/99607

https://www.tenable.com/security/tns-2017-12

https://security.netapp.com/advisory/ntap-20180112-0001/

https://access.redhat.com/errata/RHSA-2018:1296

Details

Source: MITRE

Published: 2017-07-10

Updated: 2022-07-20

Type: CWE-125

Risk Information

CVSS v2

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Impact Score: 5.2

Exploitability Score: 3.9

Severity: CRITICAL