VID |
22741 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is 7.0.x prior to 7.0.10. It is, therefore, affected by multiple vulnerabilities :
- An overflow condition exists in the curl_escape() function in interface.c due to improper handling of overly long strings. An unauthenticated, remote attacker can exploit this to cause a heap-based buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.
- An integer overflow condition exists in the zend_mm_realloc_heap() function in zend_alloc.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-7.php#7.0.10
* Platforms Affected: PHP Prior to 7.0.10 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (7.0.10 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|