CVE-2017-11142
https://notcve.org/view.php?id=CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c. En PHP anterior a versión 5.6.31, versión 7.x anterior a 7.0.17 y versión 7.1.x anterior a 7.1.3, los atacantes remotos podrían causar un ataque de denegación de servicio de consumo de CPU mediante la inyección de variables de formulario largo, relacionadas con el archivo main/php_variables.c. • http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99601 https://bugs.php.net/bug.php?id=73807 https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3 https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3 https://security.netapp.com/advisory/ntap-20180112-0001 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security • CWE-400: Uncontrolled Resource Consumption •
CVE-2017-11144 – php: Incorrect return value check of OpenSSL sealing function leads to crash
https://notcve.org/view.php?id=CVE-2017-11144
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission. En PHP, en versiones anteriores a la 5.6.31, las versiones 7.x anteriores a la 7.0.21 y las versiones 7.1.x anteriores a la 7.1.7, el código de sellado PEM de la extensión openssl no comprobó el valor de retorno de la función de sellado de OpenSSL, lo que podría conducir al cierre inesperado del intérprete de PHP. Esto está relacionado con un conflicto de interpretación para un número negativo en ext/openssl/openssl.c y una omisión de documentación OpenSSL. • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=74651 https://securi • CWE-253: Incorrect Check of Function Return Value CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2017-9224 – oniguruma: Out-of-bounds stack read in match_at() during regular expression searching
https://notcve.org/view.php?id=CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. Un problema fue encontrado en Oniguruma versión 6.2.0, tal y como es usado en Oniguruma-mod en Ruby hasta la versión 2.4.1 y mbstring en PHP hasta la versión 7.1.5. Una lectura fuera de límites de la pila ocurre en la función match_at() durante la búsqueda de expresión regular. • http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://access.redhat.com/security/cve/CVE-2017-9224 https://bugzilla.redhat.com/show_bug.cgi?id=1466730 • CWE-125: Out-of-bounds Read •
CVE-2017-9225
https://notcve.org/view.php?id=CVE-2017-9225
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow. Se descubrió un problema en Oniguruma versión 6.2.0, tal como es usado en Oniguruma-mod en Ruby hasta la versión 2.4.1 y mbstring en PHP hasta la versión 7.1.5. • https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f https://github.com/kkos/oniguruma/issues/56 • CWE-787: Out-of-bounds Write •
CVE-2017-9226 – oniguruma: Heap buffer overflow in next_state_val() during regular expression compilation
https://notcve.org/view.php?id=CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. Un problema fue encontrado en Oniguruma versión 6.2.0, tal y como es usado en Oniguruma-mod en Ruby hasta la versión 2.4.1 y mbstring en PHP hasta la versión 7.1.5. • http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://access.redhat.com/security/cve/CVE-2017-9226 https://bugzilla.redhat.com/show_bug.cgi?id=1466736 • CWE-787: Out-of-bounds Write •