CVE-2017-11628
Publication date 25 July 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| php7.0 | ||
| 16.04 LTS xenial |
Fixed 7.0.22-0ubuntu0.16.04.1
|
|
| 14.04 LTS trusty | Not in release | |
| php5 | ||
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.22
|
|
| php7.1 | ||
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3382-1
- PHP vulnerabilities
- 10 August 2017
- USN-3382-2
- PHP vulnerabilities
- 18 December 2017