Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Hyperlink | Source | Resource |
|---|---|---|
| http://php.net/ChangeLog-5.php | cve@mitre.org | Release Notes Vendor Advisory |
| http://php.net/ChangeLog-7.php | cve@mitre.org | Release Notes Vendor Advisory |
| http://www.debian.org/security/2017/dsa-3783 | cve@mitre.org | Third Party Advisory |
| http://www.securityfocus.com/bid/95783 | cve@mitre.org | Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1037659 | cve@mitre.org | Broken Link Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2018:1296 | cve@mitre.org | Third Party Advisory |
| https://bugs.php.net/bug.php?id=73768 | cve@mitre.org | Issue Tracking Patch Vendor Advisory |
| https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be | cve@mitre.org | Issue Tracking Patch Third Party Advisory |
| https://security.gentoo.org/glsa/201702-29 | cve@mitre.org | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20180112-0001/ | cve@mitre.org | Third Party Advisory |
| https://www.tenable.com/security/tns-2017-04 | cve@mitre.org | Third Party Advisory |
| http://php.net/ChangeLog-5.php | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Vendor Advisory |
| http://php.net/ChangeLog-7.php | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Vendor Advisory |
| http://www.debian.org/security/2017/dsa-3783 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| http://www.securityfocus.com/bid/95783 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1037659 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2018:1296 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| https://bugs.php.net/bug.php?id=73768 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Patch Vendor Advisory |
| https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Patch Third Party Advisory |
| https://security.gentoo.org/glsa/201702-29 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20180112-0001/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| https://www.tenable.com/security/tns-2017-04 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |