In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1034-1 | php5 security update |
Debian DSA |
DSA-4081-1 | php5 security update |
EUVD |
EUVD-2017-2778 | In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. |
Ubuntu USN |
USN-3382-1 | PHP vulnerabilities |
Ubuntu USN |
USN-3382-2 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:57:57.688Z
Reserved: 2017-07-10T00:00:00
Link: CVE-2017-11143
No data.
Status : Deferred
Published: 2017-07-10T14:29:00.587
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-11143
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN