CVE-2016-7134
high-risk
Published 2016-09-12
ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call.
Do I need to act?
-
0.75% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 72dbb7f416160f490c4e9987040989a10ad431c7
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (14)
Mailing List
http://openwall.com/lists/oss-security/2016/09/02/9
Release Notes
http://www.php.net/ChangeLog-7.php
Release Notes
https://bugs.php.net/bug.php?id=72674
Mailing List
http://openwall.com/lists/oss-security/2016/09/02/9
Release Notes
http://www.php.net/ChangeLog-7.php
Release Notes
https://bugs.php.net/bug.php?id=72674
51
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
16/34 · Moderate