CVE编号
CVE-2018-7584利用情况
暂无补丁情况
官方补丁披露时间
2018-03-02漏洞描述
在PHP through 5.6.33,7.0.x之前的7.0.28,7.1.x到7.1.14和7.2.x到7.2.2中,在ext/Standard/http_fopen_Wrapper.c中的php_stream_url_row_http_ex函数中解析http响应时,存在一个基于堆栈的缓冲区。这随后导致复制一个大字符串。 解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
参考链接 |
|
---|---|
http://php.net/ChangeLog-7.php | |
http://www.securityfocus.com/bid/103204 | |
http://www.securitytracker.com/id/1041607 | |
https://access.redhat.com/errata/RHSA-2019:2519 | |
https://bugs.php.net/bug.php?id=75981 | |
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba | |
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html | |
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html | |
https://usn.ubuntu.com/3600-1/ | |
https://usn.ubuntu.com/3600-2/ | |
https://www.debian.org/security/2018/dsa-4240 | |
https://www.exploit-db.com/exploits/44846/ | |
https://www.tenable.com/security/tns-2018-03 | |
https://www.tenable.com/security/tns-2018-12 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | php | php | * |
Up to (including) 5.6.33 |
|||||
运行在以下环境 | |||||||||
应用 | php | php | * |
From (including) 7.0.0 |
Up to (excluding) 7.0.28 |
||||
运行在以下环境 | |||||||||
应用 | php | php | * |
From (including) 7.1.0 |
Up to (including) 7.1.14 |
||||
运行在以下环境 | |||||||||
应用 | php | php | * |
From (including) 7.2.0 |
Up to (including) 7.2.2 |
||||
运行在以下环境 | |||||||||
系统 | redhat_7 | php | * |
Up to (excluding) 0:5.4.16-48.el7 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12 | apache2-mod_php5 | * |
Up to (excluding) 5.5.14-109.24 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | php5 | * |
Up to (excluding) 5.5.9+dfsg-1ubuntu4.24 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | php7.0 | * |
Up to (excluding) 7.0.28-0ubuntu0.16.04.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | php7.2 | * |
Up to (excluding) 7.2.3-1ubuntu1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...