PHP is vulnerable to out-of-bounds read attacks. This exists in the php_wddx_push_element
function in ext/wddx/wddx.c
which allows remote attackers to cause a denial of service or possibly have unspecified other impact via an empty boolean element in a wddxPacket
XML document.
CPE | Name | Operator | Version |
---|---|---|---|
rh-php70-php | eq | 7.0.10__2.el7 | |
rh-php70-php | eq | 7.0.10__2.el6 | |
rh-php70-php | eq | 7.0.10__2.el7 | |
rh-php70-php | eq | 7.0.10__2.el6 |
lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
www.debian.org/security/2016/dsa-3737
www.openwall.com/lists/oss-security/2016/12/12/2
www.php.net/ChangeLog-5.php
www.php.net/ChangeLog-7.php
www.securityfocus.com/bid/94846
access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.1_release_notes/chap-rhscl#sect-RHSCL-Changes-php
access.redhat.com/errata/RHSA-2018:1296
access.redhat.com/security/updates/classification/#moderate
bugs.php.net/bug.php?id=73631
github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
security.gentoo.org/glsa/201702-29