RULE(RULE ID:316997)

Rule General Information
Release Date: 2018-11-20
Rule Name: PHP Zend_hash_destroy Uninitialized Pointer Code Execution Vulnerability(CVE-2017-5340)
Severity:
CVE ID:
Rule Protection Details
Description: Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, FreeBSD, Other Unix, Linux
Reference: SecurityFocusBID:95371
SecurityTrackerID:1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://bugs.php.net/bug.php?id=73832
https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12
https://security.netapp.com/advisory/ntap-20180112-0001/
Solutions
More advisories have been published on the website, please visit for more suggestions:
http://php.net/ChangeLog-7.php#7.0.15