In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1034-1 | php5 security update |
EUVD |
EUVD-2017-2782 | In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c. |
Ubuntu USN |
USN-3382-1 | PHP vulnerabilities |
Ubuntu USN |
USN-3382-2 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:57:57.974Z
Reserved: 2017-07-10T00:00:00
Link: CVE-2017-11147
No data.
Status : Deferred
Published: 2017-07-10T14:29:00.697
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-11147
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN