CVE-2017-11144
Published: 10 July 2017
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.22)
|
|
upstream |
Released
(5.6.31)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/php/php-src/commit/89637c6b41b510c20d262c17483f582f115c66d6 |
||
php7.0 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(7.0.21)
|
|
xenial |
Released
(7.0.22-0ubuntu0.16.04.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Released
(7.0.22-0ubuntu0.17.04.1)
|
|
Patches: upstream: https://github.com/php/php-src/commit/73cabfedf519298e1a11192699f44d53c529315e |
||
php7.1 Launchpad, Ubuntu, Debian |
artful |
Released
(7.1.8-1ubuntu1)
|
trusty |
Does not exist
|
|
upstream |
Released
(7.1.7)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/php/php-src/commit/73cabfedf519298e1a11192699f44d53c529315e |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |