CVE-2017-7189

NameCVE-2017-7189
Descriptionmain/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21vulnerable
php7.0 (PTS)stretch (security)7.0.33-0+deb9u12vulnerable
stretch (lts), stretch7.0.33-0+deb9u19vulnerable
php7.3 (PTS)buster, buster (lts)7.3.31-1~deb10u8vulnerable
buster (security)7.3.31-1~deb10u7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5source(unstable)(unfixed)
php7.0source(unstable)(unfixed)
php7.3source(unstable)(unfixed)

Notes

[buster] - php7.3 <ignored> (Upstream patch breaks existing applications, was reverted again, revisit if a new approach has been identified)
[stretch] - php7.0 <ignored> (Upstream patch breaks existing applications, was reverted again, revisit if a new approach has been identified)
[jessie] - php5 <ignored> (Upstream patch breaks existing applications, was reverted again, revisit if a new approach has been identified)
PHP Bug: https://bugs.php.net/bug.php?id=74192
https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
The commit was later on reverted again because of breaking some features.
See as well the related CVE-2017-7272.
[wheezy] - php5 <ignored> (patch was applied for CVE-2017-7272, reverting it now is not useful, no regressions were reported for ELTS. Revisit if upstream identifies a better approach.)

Search for package or bug name: Reporting problems