In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/07/10/6 | patch mailing list third party advisory |
https://www.tenable.com/security/tns-2017-12 | third party advisory |
https://access.redhat.com/errata/RHSA-2018:1296 | third party advisory vendor advisory |
http://php.net/ChangeLog-5.php | release notes vendor advisory |
https://security.netapp.com/advisory/ntap-20180112-0001/ | third party advisory |
http://php.net/ChangeLog-7.php | release notes vendor advisory |
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 | |
http://www.securityfocus.com/bid/99607 | third party advisory vdb entry |
https://bugs.php.net/bug.php?id=73773 | vendor advisory issue tracking exploit |