Description
In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
References (9)
Core 9
Core References
Mailing List, Patch, Third Party Advisory x_refsource_confirm
http://openwall.com/lists/oss-security/2017/07/10/6
Third Party Advisory x_refsource_confirm
https://www.tenable.com/security/tns-2017-12
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1296
Release Notes, Vendor Advisory x_refsource_confirm
http://php.net/ChangeLog-5.php
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20180112-0001/
Release Notes, Vendor Advisory x_refsource_confirm
http://php.net/ChangeLog-7.php
Various Sources x_refsource_confirm
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/99607
Exploit, Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugs.php.net/bug.php?id=73773
Scores
CVSS v3
9.1
EPSS
0.0369
EPSS Percentile
88.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (2)
netapp/clustered_data_ontap
php/php
< 5.6.30
Published
Jul 10, 2017
Tracked Since
Feb 18, 2026