In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e | |
https://access.redhat.com/errata/RHSA-2018:1296 | vendor advisory |
https://security.netapp.com/advisory/ntap-20180112-0001/ | |
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c | |
https://www.debian.org/security/2018/dsa-4081 | vendor advisory |
https://www.debian.org/security/2018/dsa-4080 | vendor advisory |
https://bugs.php.net/bug.php?id=74603 | third party advisory issue tracking |
http://www.securityfocus.com/bid/99489 | third party advisory vdb entry |
https://security.gentoo.org/glsa/201709-21 | vendor advisory |