|
|||
Rule General Information |
---|
Release Date: | 2018-11-20 | |
Rule Name: | PHP Zend_hash_destroy Uninitialized Pointer Code Execution Vulnerability(CVE-2017-5340) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, FreeBSD, Other Unix, Linux | |
Reference: | SecurityFocusBID:95371 SecurityTrackerID:1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=73832 https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12 https://security.netapp.com/advisory/ntap-20180112-0001/ |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: http://php.net/ChangeLog-7.php#7.0.15 |