Page 16 of 85 results (0.028 seconds)

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. Desbordamiento de entero en la función gdImageWebpCtx en gd_webp.c en la GD Graphics Library (también conocido como libgd) hasta la versión 2.2.3, tal como se utiliza en PHP hasta la versión 7.0.11, permite a atacantes remotos provocar una denegación de servicio (desbordamiento de búfer basado en memoria dinámica) o tener otro posible impacto no especificado a través de llamadas imagewebp e imagedestroy manipuladas. • http://www.debian.org/security/2016/dsa-3693 http://www.securityfocus.com/bid/93184 https://bugs.php.net/bug.php?id=73003 https://github.com/libgd/libgd/commit/40bec0f38f50e8510f5bb71a82f516d46facde03 https://github.com/libgd/libgd/issues/308 https://github.com/php/php-src/commit/c18263e0e0769faee96a5d0ee04b750c442783c6 https://security.gentoo.org/glsa/201612-09 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 2%CPEs: 12EXPL: 1

The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c. La funcionalidad de verificación de firma ZIP en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no asegura que el campo uncompressed_filesize sea suficientemente grande, lo que podría permitir a atacantes remotos provocar una denegación de servicio (acceso a memoria fuera de límites) o tener otro posible impacto no especificado a través de una archivo PHAR manipulado, relacionado con ext/phar/util.c y ext/phar/zip.c. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=72928 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 3%CPEs: 12EXPL: 1

ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument. ext/intl/msgformat/msgformat_format.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no restringe adecuadamente la longitud proporcionada a locale para la clase Locale en la libreria ICU, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o tener otro posible impacto no especificado a través de una llamada MessageFormatter::formatMessage con un primer argumento grande. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=73007 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVSS: 8.1EPSS: 1%CPEs: 12EXPL: 1

ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata. ext/mysqlnd/mysqlnd_wireprotocol.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no verifica que un campo BIT tenga el indicador UNSIGNED_FLAG, lo que podría permitir a servidores MySQL remotos provocar una denegación de servicio (desbordamiento de búfer basado en memoria dinámica) o tener otro posible impacto no especificado a través de metadatos de campo manipulado. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=72293 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 9.8EPSS: 1%CPEs: 12EXPL: 1

ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data. ext/spl/spl_array.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 procede con SplArray no serializado sin validar un valor de retorno y tipo de dato, lo que permite a atacantes remotos provocar una denegación de servicio o tener otro posible impacto no especificado a través de datos serializados manipulados. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=73029 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-20: Improper Input Validation CWE-252: Unchecked Return Value •