In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1066-1 php5 security update
Debian DSA Debian DSA DSA-4080-1 php7.0 security update
Debian DSA Debian DSA DSA-4081-1 php5 security update
EUVD EUVD EUVD-2017-3240 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
Ubuntu USN Ubuntu USN USN-3382-1 PHP vulnerabilities
Ubuntu USN Ubuntu USN USN-3382-2 PHP vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T18:12:40.688Z

Reserved: 2017-07-25T00:00:00

Link: CVE-2017-11628

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-07-25T23:29:00.497

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-11628

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-07-25T00:00:00Z

Links: CVE-2017-11628 - Bugzilla

cve-icon OpenCVE Enrichment

No data.