{ "id": "CVE-2017-11147", "sourceIdentifier": "cve@mitre.org", "published": "2017-07-10T14:29:00.697", "lastModified": "2025-04-20T01:37:25.860", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c." }, { "lang": "es", "value": "En PHP anterior a versi\u00f3n 5.6.30 y versi\u00f3n 7.x anterior a 7.0.15, el manejador de archivos PHAR podr\u00eda ser utilizado por archivos maliciosos suministrados por los atacantes para bloquear el int\u00e9rprete PHP o potencialmente divulgar informaci\u00f3n debido a una lectura excesiva de b\u00fafer en la funci\u00f3n phar_parse_pharfile en el archivo ext/phar/phar.c." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-125" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.6.30", "matchCriteriaId": "76B7220C-1274-4F7F-914D-A1C6BF0EBDE8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", "versionEndExcluding": "7.0.15", "matchCriteriaId": "3A59822F-11EA-4F4D-9721-6D3DD9842FC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.1.0", "versionEndExcluding": "7.1.1", "matchCriteriaId": "473456E3-B45F-46C0-AEF8-72D78487CF38" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163" } ] } ] } ], "references": [ { "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451", "source": "cve@mitre.org" }, { "url": "http://openwall.com/lists/oss-security/2017/07/10/6", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://php.net/ChangeLog-5.php", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://php.net/ChangeLog-7.php", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/99607", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:1296", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugs.php.net/bug.php?id=73773", "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20180112-0001/", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.tenable.com/security/tns-2017-12", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://openwall.com/lists/oss-security/2017/07/10/6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://php.net/ChangeLog-5.php", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://php.net/ChangeLog-7.php", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/99607", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:1296", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugs.php.net/bug.php?id=73773", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20180112-0001/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.tenable.com/security/tns-2017-12", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }