CVE-2018-7584
critical-risk
Published 2018-03-01
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
Do I need to act?
!
83.1% chance of exploitation in next 30 days
EPSS score — higher than 17% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (8)
References (28)
Release Notes
http://php.net/ChangeLog-7.php
Third Party Advisory
http://www.securityfocus.com/bid/103204
Third Party Advisory
http://www.securitytracker.com/id/1041607
Issue Tracking
https://bugs.php.net/bug.php?id=75981
Third Party Advisory
https://usn.ubuntu.com/3600-1/
Third Party Advisory
https://usn.ubuntu.com/3600-2/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4240
Third Party Advisory
https://www.tenable.com/security/tns-2018-03
Third Party Advisory
https://www.tenable.com/security/tns-2018-12
Release Notes
http://php.net/ChangeLog-7.php
Third Party Advisory
http://www.securityfocus.com/bid/103204
Third Party Advisory
http://www.securitytracker.com/id/1041607
Issue Tracking
https://bugs.php.net/bug.php?id=75981
and 8 more references
73
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
27/34 · High
Exposure
14/34 · Moderate