![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-12932 – php: Heap use after free in ext/standard/var_unserializer.re
https://notcve.org/view.php?id=CVE-2017-12932
18 Aug 2017 — ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP. Ext/standard/var_unserializer.re en PHP en en sus versiones 7.0.x hasta 7.0.22 y versiones 7.1.x hasta 7.1.8 es propenso a un uso de memoria dinámica antes de liberación (hea... • http://php.net/ChangeLog-7.php • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-12934 – php: heap use after free in ext/standard/var_unserializer.re
https://notcve.org/view.php?id=CVE-2017-12934
18 Aug 2017 — ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP. ext/standard/var_unserializer.re en PHP en versiones 7.0.x anteriores a la 7.0.21 y versiones 7.1.x anteriores a la 7.1.7 es propenso a un uso de memoria dinámica antes de liberación (heap use after free) al deserial... • http://php.net/ChangeLog-7.php • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-7890 – php: Buffer over-read from unitialized data in gdImageCreateFromGifCtx function
https://notcve.org/view.php?id=CVE-2017-7890
02 Aug 2017 — The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information. La función de descodificación de GIF "gdImageCreateFromGifCtx " en gd_gif_in.c en GD Graphics Library (también conocido como libgd),que se usa en PHP en vers... • http://php.net/ChangeLog-5.php • CWE-20: Improper Input Validation CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11628 – php: Stack based 1-byte buffer over-write in zend_ini_do_op() function Zend/zend_ini_parser.c
https://notcve.org/view.php?id=CVE-2017-11628
25 Jul 2017 — In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives. En PHP, en versiones anteriores a la 5.6.31, versio... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11362 – php: Stack-based buffer over-read in msgfmt_parse_message function
https://notcve.org/view.php?id=CVE-2017-11362
17 Jul 2017 — In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function. En PHP, en versiones 7.x anteriores a la 7.0.21 y versiones 7.1.x anteriores a la 7.1.7, ext/intl/msgformat/msgf... • https://access.redhat.com/errata/RHSA-2018:1296 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11145 – php: wddx_deserialize() heap out-of-bound read via php_parse_date()
https://notcve.org/view.php?id=CVE-2017-11145
10 Jul 2017 — In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist. En PHP anterior a versión 5.6.31, versión 7.x anterior a 7.0.21... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11144 – php: Incorrect return value check of OpenSSL sealing function leads to crash
https://notcve.org/view.php?id=CVE-2017-11144
10 Jul 2017 — In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission. En PHP, en versiones anteriores a la 5.6.31, las versiones 7.x anteriores a la 7.0.21 y las versiones 7.1.x anteriores a la 7.1.7, el código de sellado PEM de la exten... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e • CWE-253: Incorrect Check of Function Return Value CWE-754: Improper Check for Unusual or Exceptional Conditions •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11142 – Debian Security Advisory 4081-1
https://notcve.org/view.php?id=CVE-2017-11142
10 Jul 2017 — In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c. En PHP anterior a versión 5.6.31, versión 7.x anterior a 7.0.17 y versión 7.1.x anterior a 7.1.3, los atacantes remotos podrían causar un ataque de denegación de servicio de consumo de CPU mediante la inyección de variables de formulario largo, relacionadas con el archivo main/php_variables.c. Several vulne... • http://openwall.com/lists/oss-security/2017/07/10/6 • CWE-400: Uncontrolled Resource Consumption •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11147 – php: Out-of-bounds read in phar_parse_pharfile
https://notcve.org/view.php?id=CVE-2017-11147
10 Jul 2017 — In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c. En PHP anterior a versión 5.6.30 y versión 7.x anterior a 7.0.15, el manejador de archivos PHAR podría ser utilizado por archivos maliciosos suministrados por los atacantes para bloquear el intérprete PHP o potencialmente divulgar info... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-10397 – Ubuntu Security Notice USN-3382-2
https://notcve.org/view.php?id=CVE-2016-10397
10 Jul 2017 — In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c). En PHP, en versiones anteriores a la 5.6.28 y en versiones 7.x anteriores a la 7.0.13, la manipulación incorrecta de varios componente... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=b061fa909de77085d3822a89ab901b934d0362c4 • CWE-20: Improper Input Validation •