CVE-2017-11145
high-risk
Published 2017-07-10
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
Do I need to act?
~
7.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (24)
Mailing List
http://openwall.com/lists/oss-security/2017/07/10/6
Release Notes
http://php.net/ChangeLog-5.php
Release Notes
http://php.net/ChangeLog-7.php
Third Party Advisory
https://bugs.php.net/bug.php?id=74819
Mailing List
http://openwall.com/lists/oss-security/2017/07/10/6
Release Notes
http://php.net/ChangeLog-5.php
Release Notes
http://php.net/ChangeLog-7.php
Third Party Advisory
https://bugs.php.net/bug.php?id=74819
and 4 more references
58
/ 100
high-risk
Severity
26/34 · High
Exploitability
10/34 · Low
Exposure
22/34 · High