CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
24.9%
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | php7.0-cgi | < 7.0.33-0ubuntu0.16.04.16+esm6 | UNKNOWN |
Ubuntu | 16.04 | noarch | libapache2-mod-php7.0 | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | libapache2-mod-php7.0-dbgsym | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | libphp7.0-embed | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | libphp7.0-embed-dbgsym | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | php7.0 | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | php7.0-bcmath | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | php7.0-bcmath-dbgsym | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | php7.0-bz2 | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |
Ubuntu | 16.04 | noarch | php7.0-bz2-dbgsym | < 7.0.33-0ubuntu0.16.04.16 | UNKNOWN |