CVE-2017-11628

NameCVE-2017-11628
DescriptionIn PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1066-1, DSA-4080-1, DSA-4081-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed
php7.0 (PTS)stretch (security)7.0.33-0+deb9u12fixed
stretch (lts), stretch7.0.33-0+deb9u19fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5sourcewheezy5.4.45-0+deb7u10DLA-1066-1
php5sourcejessie5.6.33+dfsg-0+deb8u1DSA-4081-1
php5source(unstable)(unfixed)low
php7.0sourcestretch7.0.27-0+deb9u1DSA-4080-1
php7.0source(unstable)7.0.22-1low
php7.1source(unstable)7.1.8-1low

Notes

https://bugs.php.net/bug.php?id=74603
Fixed in 7.1.7, 7.0.21, 5.6.31
Fixed by https://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e

Search for package or bug name: Reporting problems