Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2017-11628
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-25 Jul, 2017 | 23:00
Updated At-05 Aug, 2024 | 18:12
Rejected At-
▼CVE Numbering Authority (CNA)

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2018:1296
vendor-advisory
x_refsource_REDHAT
https://security.netapp.com/advisory/ntap-20180112-0001/
x_refsource_CONFIRM
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
x_refsource_MISC
https://www.debian.org/security/2018/dsa-4081
vendor-advisory
x_refsource_DEBIAN
https://www.debian.org/security/2018/dsa-4080
vendor-advisory
x_refsource_DEBIAN
https://bugs.php.net/bug.php?id=74603
x_refsource_MISC
http://www.securityfocus.com/bid/99489
vdb-entry
x_refsource_BID
https://security.gentoo.org/glsa/201709-21
vendor-advisory
x_refsource_GENTOO
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2018:1296
vendor-advisory
x_refsource_REDHAT
x_transferred
https://security.netapp.com/advisory/ntap-20180112-0001/
x_refsource_CONFIRM
x_transferred
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
x_refsource_MISC
x_transferred
https://www.debian.org/security/2018/dsa-4081
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://www.debian.org/security/2018/dsa-4080
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://bugs.php.net/bug.php?id=74603
x_refsource_MISC
x_transferred
http://www.securityfocus.com/bid/99489
vdb-entry
x_refsource_BID
x_transferred
https://security.gentoo.org/glsa/201709-21
vendor-advisory
x_refsource_GENTOO
x_transferred
Details not found