ID CVE-2018-14883
Summary An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
References
Vulnerable Configurations
  • PHP PHP
    cpe:2.3:a:php:php
  • PHP 0.1
    cpe:2.3:a:php:php:0.1
  • PHP 0.2
    cpe:2.3:a:php:php:0.2
  • PHP 0.2.1
    cpe:2.3:a:php:php:0.2.1
  • PHP 0.2.3
    cpe:2.3:a:php:php:0.2.3
  • PHP 0.3
    cpe:2.3:a:php:php:0.3
  • PHP 0.5
    cpe:2.3:a:php:php:0.5
  • PHP 0.5.3
    cpe:2.3:a:php:php:0.5.3
  • PHP 0.7
    cpe:2.3:a:php:php:0.7
  • PHP 0.9
    cpe:2.3:a:php:php:0.9
  • PHP 0.9.1
    cpe:2.3:a:php:php:0.9.1
  • PHP 0.9.3
    cpe:2.3:a:php:php:0.9.3
  • PHP 0.10
    cpe:2.3:a:php:php:0.10
  • PHP 0.90
    cpe:2.3:a:php:php:0.90
  • PHP PHP_FI 1.0
    cpe:2.3:a:php:php:1.0
  • PHP 1.0.2
    cpe:2.3:a:php:php:1.0.2
  • PHP 1.0.4
    cpe:2.3:a:php:php:1.0.4
  • PHP 1.1.0
    cpe:2.3:a:php:php:1.1.0
  • PHP 1.2.0
    cpe:2.3:a:php:php:1.2.0
  • PHP 1.2.2
    cpe:2.3:a:php:php:1.2.2
  • PHP 1.2.4
    cpe:2.3:a:php:php:1.2.4
  • PHP 1.3.1
    cpe:2.3:a:php:php:1.3.1
  • PHP 1.4
    cpe:2.3:a:php:php:1.4
  • PHP PHP_FI 2.0
    cpe:2.3:a:php:php:2.0
  • PHP 2.0.0
    cpe:2.3:a:php:php:2.0.0
  • PHP 2.0.2
    cpe:2.3:a:php:php:2.0.2
  • PHP PHP_FI 2.0b10
    cpe:2.3:a:php:php:2.0b10
  • PHP PHP 3.0
    cpe:2.3:a:php:php:3.0
  • PHP PHP 3.0.1
    cpe:2.3:a:php:php:3.0.1
  • PHP PHP 3.0.2
    cpe:2.3:a:php:php:3.0.2
  • PHP PHP 3.0.3
    cpe:2.3:a:php:php:3.0.3
  • PHP PHP 3.0.4
    cpe:2.3:a:php:php:3.0.4
  • PHP PHP 3.0.5
    cpe:2.3:a:php:php:3.0.5
  • PHP PHP 3.0.6
    cpe:2.3:a:php:php:3.0.6
  • PHP PHP 3.0.7
    cpe:2.3:a:php:php:3.0.7
  • PHP PHP 3.0.8
    cpe:2.3:a:php:php:3.0.8
  • PHP PHP 3.0.9
    cpe:2.3:a:php:php:3.0.9
  • PHP PHP 3.0.10
    cpe:2.3:a:php:php:3.0.10
  • PHP PHP 3.0.11
    cpe:2.3:a:php:php:3.0.11
  • PHP PHP 3.0.12
    cpe:2.3:a:php:php:3.0.12
  • PHP PHP 3.0.13
    cpe:2.3:a:php:php:3.0.13
  • PHP PHP 3.0.14
    cpe:2.3:a:php:php:3.0.14
  • PHP PHP 3.0.15
    cpe:2.3:a:php:php:3.0.15
  • PHP PHP 3.0.16
    cpe:2.3:a:php:php:3.0.16
  • PHP PHP 3.0.17
    cpe:2.3:a:php:php:3.0.17
  • PHP PHP 3.0.18
    cpe:2.3:a:php:php:3.0.18
  • PHP 4.0.0
    cpe:2.3:a:php:php:4.0
  • PHP PHP 4.0 Beta 1
    cpe:2.3:a:php:php:4.0:beta1
  • PHP PHP 4.0 Beta 2
    cpe:2.3:a:php:php:4.0:beta2
  • PHP PHP 4.0 Beta 3
    cpe:2.3:a:php:php:4.0:beta3
  • PHP PHP 4.0 Beta 4
    cpe:2.3:a:php:php:4.0:beta4
  • PHP PHP 4.0 Beta 4 Patch Level 1
    cpe:2.3:a:php:php:4.0:beta_4_patch1
  • PHP PHP 4.0.0
    cpe:2.3:a:php:php:4.0.0
  • PHP PHP 4.0.1
    cpe:2.3:a:php:php:4.0.1
  • PHP PHP 4.0.2
    cpe:2.3:a:php:php:4.0.2
  • PHP PHP 4.0.3
    cpe:2.3:a:php:php:4.0.3
  • PHP PHP 4.0.4
    cpe:2.3:a:php:php:4.0.4
  • PHP PHP 4.0.5
    cpe:2.3:a:php:php:4.0.5
  • PHP PHP 4.0.6
    cpe:2.3:a:php:php:4.0.6
  • PHP PHP 4.0.7
    cpe:2.3:a:php:php:4.0.7
  • PHP PHP 4.1.0
    cpe:2.3:a:php:php:4.1.0
  • PHP PHP 4.1.1
    cpe:2.3:a:php:php:4.1.1
  • PHP PHP 4.1.2
    cpe:2.3:a:php:php:4.1.2
  • PHP 4.1.0
    cpe:2.3:a:php:php:4.1.3
  • PHP 4.2.0
    cpe:2.3:a:php:php:4.2
  • PHP PHP 4.2.0
    cpe:2.3:a:php:php:4.2.0
  • PHP PHP 4.2.1
    cpe:2.3:a:php:php:4.2.1
  • PHP PHP 4.2.2
    cpe:2.3:a:php:php:4.2.2
  • PHP PHP 4.2.3
    cpe:2.3:a:php:php:4.2.3
  • PHP 4.2.0
    cpe:2.3:a:php:php:4.2.4
  • PHP 4.3.0
    cpe:2.3:a:php:php:4.3
  • PHP PHP 4.3.0
    cpe:2.3:a:php:php:4.3.0
  • PHP PHP 4.3.1
    cpe:2.3:a:php:php:4.3.1
  • PHP PHP 4.3.2
    cpe:2.3:a:php:php:4.3.2
  • PHP PHP 4.3.3
    cpe:2.3:a:php:php:4.3.3
  • PHP PHP 4.3.4
    cpe:2.3:a:php:php:4.3.4
  • PHP PHP 4.3.5
    cpe:2.3:a:php:php:4.3.5
  • PHP PHP 4.3.6
    cpe:2.3:a:php:php:4.3.6
  • PHP PHP 4.3.7
    cpe:2.3:a:php:php:4.3.7
  • PHP PHP 4.3.8
    cpe:2.3:a:php:php:4.3.8
  • PHP PHP 4.3.9
    cpe:2.3:a:php:php:4.3.9
  • PHP PHP 4.3.10
    cpe:2.3:a:php:php:4.3.10
  • PHP PHP 4.3.11
    cpe:2.3:a:php:php:4.3.11
  • PHP PHP 4.4.0
    cpe:2.3:a:php:php:4.4.0
  • PHP PHP 4.4.1
    cpe:2.3:a:php:php:4.4.1
  • PHP PHP 4.4.2
    cpe:2.3:a:php:php:4.4.2
  • PHP PHP 4.4.3
    cpe:2.3:a:php:php:4.4.3
  • PHP PHP 4.4.4
    cpe:2.3:a:php:php:4.4.4
  • PHP PHP 4.4.5
    cpe:2.3:a:php:php:4.4.5
  • PHP PHP 4.4.6
    cpe:2.3:a:php:php:4.4.6
  • PHP PHP 4.4.7
    cpe:2.3:a:php:php:4.4.7
  • PHP 4.4.8
    cpe:2.3:a:php:php:4.4.8
  • PHP 4.4.9
    cpe:2.3:a:php:php:4.4.9
  • PHP PHP 5.0.0
    cpe:2.3:a:php:php:5.0.0
  • PHP PHP 5.0.0 Beta1
    cpe:2.3:a:php:php:5.0.0:beta1
  • PHP PHP 5.0.0 Beta2
    cpe:2.3:a:php:php:5.0.0:beta2
  • PHP PHP 5.0.0 Beta3
    cpe:2.3:a:php:php:5.0.0:beta3
  • PHP PHP 5.0.0 Beta4
    cpe:2.3:a:php:php:5.0.0:beta4
  • PHP PHP 5.0.0 RC1
    cpe:2.3:a:php:php:5.0.0:rc1
  • PHP PHP 5.0.0 RC2
    cpe:2.3:a:php:php:5.0.0:rc2
  • PHP PHP 5.0.0 RC3
    cpe:2.3:a:php:php:5.0.0:rc3
  • PHP PHP 5.0.1
    cpe:2.3:a:php:php:5.0.1
  • PHP PHP 5.0.2
    cpe:2.3:a:php:php:5.0.2
  • PHP PHP 5.0.3
    cpe:2.3:a:php:php:5.0.3
  • PHP PHP 5.0.4
    cpe:2.3:a:php:php:5.0.4
  • PHP PHP 5.0.5
    cpe:2.3:a:php:php:5.0.5
  • PHP 5.1.0
    cpe:2.3:a:php:php:5.1
  • PHP PHP 5.1.0
    cpe:2.3:a:php:php:5.1.0
  • PHP PHP 5.1.1
    cpe:2.3:a:php:php:5.1.1
  • PHP PHP 5.1.2
    cpe:2.3:a:php:php:5.1.2
  • PHP PHP 5.1.3
    cpe:2.3:a:php:php:5.1.3
  • PHP 5.1.4
    cpe:2.3:a:php:php:5.1.4
  • PHP PHP 5.1.5
    cpe:2.3:a:php:php:5.1.5
  • PHP PHP 5.1.6
    cpe:2.3:a:php:php:5.1.6
  • PHP 5.2.0
    cpe:2.3:a:php:php:5.2.0
  • PHP 5.2.1
    cpe:2.3:a:php:php:5.2.1
  • PHP 5.2.2
    cpe:2.3:a:php:php:5.2.2
  • PHP 5.2.3
    cpe:2.3:a:php:php:5.2.3
  • PHP 5.2.4
    cpe:2.3:a:php:php:5.2.4
  • PHP 5.2.5
    cpe:2.3:a:php:php:5.2.5
  • PHP 5.2.6
    cpe:2.3:a:php:php:5.2.6
  • PHP 5.2.7
    cpe:2.3:a:php:php:5.2.7
  • PHP 5.2.8
    cpe:2.3:a:php:php:5.2.8
  • PHP 5.2.9
    cpe:2.3:a:php:php:5.2.9
  • PHP 5.2.10
    cpe:2.3:a:php:php:5.2.10
  • PHP 5.2.11
    cpe:2.3:a:php:php:5.2.11
  • PHP 5.2.12
    cpe:2.3:a:php:php:5.2.12
  • PHP 5.2.13
    cpe:2.3:a:php:php:5.2.13
  • PHP 5.2.14
    cpe:2.3:a:php:php:5.2.14
  • PHP 5.2.15
    cpe:2.3:a:php:php:5.2.15
  • PHP 5.2.16
    cpe:2.3:a:php:php:5.2.16
  • PHP 5.2.17
    cpe:2.3:a:php:php:5.2.17
  • PHP 5.3.0
    cpe:2.3:a:php:php:5.3.0
  • PHP 5.3.1
    cpe:2.3:a:php:php:5.3.1
  • PHP 5.3.2
    cpe:2.3:a:php:php:5.3.2
  • PHP 5.3.3
    cpe:2.3:a:php:php:5.3.3
  • PHP 5.3.4
    cpe:2.3:a:php:php:5.3.4
  • PHP 5.3.5
    cpe:2.3:a:php:php:5.3.5
  • PHP 5.3.6
    cpe:2.3:a:php:php:5.3.6
  • PHP 5.3.7
    cpe:2.3:a:php:php:5.3.7
  • PHP 5.3.8
    cpe:2.3:a:php:php:5.3.8
  • PHP 5.3.9
    cpe:2.3:a:php:php:5.3.9
  • PHP 5.3.10
    cpe:2.3:a:php:php:5.3.10
  • PHP 5.3.11
    cpe:2.3:a:php:php:5.3.11
  • PHP 5.3.12
    cpe:2.3:a:php:php:5.3.12
  • PHP 5.3.13
    cpe:2.3:a:php:php:5.3.13
  • PHP 5.3.14
    cpe:2.3:a:php:php:5.3.14
  • PHP 5.3.15
    cpe:2.3:a:php:php:5.3.15
  • PHP 5.3.16
    cpe:2.3:a:php:php:5.3.16
  • PHP 5.3.17
    cpe:2.3:a:php:php:5.3.17
  • PHP 5.3.18
    cpe:2.3:a:php:php:5.3.18
  • PHP 5.3.19
    cpe:2.3:a:php:php:5.3.19
  • PHP 5.3.20
    cpe:2.3:a:php:php:5.3.20
  • PHP 5.3.21
    cpe:2.3:a:php:php:5.3.21
  • PHP 5.3.22
    cpe:2.3:a:php:php:5.3.22
  • PHP 5.3.23
    cpe:2.3:a:php:php:5.3.23
  • PHP 5.3.24
    cpe:2.3:a:php:php:5.3.24
  • PHP 5.3.25
    cpe:2.3:a:php:php:5.3.25
  • PHP 5.3.26
    cpe:2.3:a:php:php:5.3.26
  • PHP 5.3.27
    cpe:2.3:a:php:php:5.3.27
  • PHP 5.3.28
    cpe:2.3:a:php:php:5.3.28
  • PHP 5.3.29
    cpe:2.3:a:php:php:5.3.29
  • PHP 5.4.0
    cpe:2.3:a:php:php:5.4.0
  • PHP 5.4.1
    cpe:2.3:a:php:php:5.4.1
  • PHP 5.4.2
    cpe:2.3:a:php:php:5.4.2
  • PHP 5.4.3
    cpe:2.3:a:php:php:5.4.3
  • PHP 5.4.4
    cpe:2.3:a:php:php:5.4.4
  • PHP 5.4.5
    cpe:2.3:a:php:php:5.4.5
  • PHP 5.4.6
    cpe:2.3:a:php:php:5.4.6
  • PHP 5.4.7
    cpe:2.3:a:php:php:5.4.7
  • PHP 5.4.8
    cpe:2.3:a:php:php:5.4.8
  • PHP 5.4.9
    cpe:2.3:a:php:php:5.4.9
  • PHP 5.4.10
    cpe:2.3:a:php:php:5.4.10
  • PHP 5.4.11
    cpe:2.3:a:php:php:5.4.11
  • PHP 5.4.12
    cpe:2.3:a:php:php:5.4.12
  • PHP 5.4.12 release candidate 1
    cpe:2.3:a:php:php:5.4.12:rc1
  • PHP 5.4.12 release candidate 2
    cpe:2.3:a:php:php:5.4.12:rc2
  • PHP 5.4.13
    cpe:2.3:a:php:php:5.4.13
  • PHP 5.4.13 release candidate 1
    cpe:2.3:a:php:php:5.4.13:rc1
  • PHP 5.4.14
    cpe:2.3:a:php:php:5.4.14
  • PHP 5.4.14 release candidate 1
    cpe:2.3:a:php:php:5.4.14:rc1
  • PHP 5.4.15
    cpe:2.3:a:php:php:5.4.15
  • PHP 5.4.15 release candidate 1
    cpe:2.3:a:php:php:5.4.15:rc1
  • PHP 5.4.16
    cpe:2.3:a:php:php:5.4.16
  • PHP 5.4.16 release candidate 1
    cpe:2.3:a:php:php:5.4.16:rc1
  • PHP 5.4.17
    cpe:2.3:a:php:php:5.4.17
  • PHP 5.4.18
    cpe:2.3:a:php:php:5.4.18
  • PHP 5.4.19
    cpe:2.3:a:php:php:5.4.19
  • PHP 5.4.20
    cpe:2.3:a:php:php:5.4.20
  • PHP 5.4.21
    cpe:2.3:a:php:php:5.4.21
  • PHP 5.4.22
    cpe:2.3:a:php:php:5.4.22
  • PHP 5.4.23
    cpe:2.3:a:php:php:5.4.23
  • PHP 5.4.24
    cpe:2.3:a:php:php:5.4.24
  • PHP 5.4.25
    cpe:2.3:a:php:php:5.4.25
  • PHP 5.4.26
    cpe:2.3:a:php:php:5.4.26
  • PHP 5.4.27
    cpe:2.3:a:php:php:5.4.27
  • PHP 5.4.28
    cpe:2.3:a:php:php:5.4.28
  • PHP 5.4.29
    cpe:2.3:a:php:php:5.4.29
  • PHP 5.4.30
    cpe:2.3:a:php:php:5.4.30
  • PHP 5.4.31
    cpe:2.3:a:php:php:5.4.31
  • PHP 5.4.32
    cpe:2.3:a:php:php:5.4.32
  • PHP 5.4.33
    cpe:2.3:a:php:php:5.4.33
  • PHP PHP 5.4.34
    cpe:2.3:a:php:php:5.4.34
  • PHP 5.4.35
    cpe:2.3:a:php:php:5.4.35
  • PHP 5.4.36
    cpe:2.3:a:php:php:5.4.36
  • PHP 5.4.37
    cpe:2.3:a:php:php:5.4.37
  • PHP 5.4.38
    cpe:2.3:a:php:php:5.4.38
  • PHP 5.4.39
    cpe:2.3:a:php:php:5.4.39
  • PHP 5.4.40
    cpe:2.3:a:php:php:5.4.40
  • PHP 5.4.41
    cpe:2.3:a:php:php:5.4.41
  • PHP 5.4.42
    cpe:2.3:a:php:php:5.4.42
  • PHP 5.4.43
    cpe:2.3:a:php:php:5.4.43
  • PHP 5.4.44
    cpe:2.3:a:php:php:5.4.44
  • PHP 5.4.45
    cpe:2.3:a:php:php:5.4.45
  • PHP 5.5.0
    cpe:2.3:a:php:php:5.5.0
  • PHP 5.5.0 alpha1
    cpe:2.3:a:php:php:5.5.0:alpha1
  • PHP 5.5.0 alpha2
    cpe:2.3:a:php:php:5.5.0:alpha2
  • PHP 5.5.0 alpha3
    cpe:2.3:a:php:php:5.5.0:alpha3
  • PHP 5.5.0 alpha4
    cpe:2.3:a:php:php:5.5.0:alpha4
  • PHP 5.5.0 alpha5
    cpe:2.3:a:php:php:5.5.0:alpha5
  • PHP 5.5.0 alpha6
    cpe:2.3:a:php:php:5.5.0:alpha6
  • PHP 5.5.0 beta1
    cpe:2.3:a:php:php:5.5.0:beta1
  • PHP 5.5.0 beta2
    cpe:2.3:a:php:php:5.5.0:beta2
  • PHP 5.5.0 beta3
    cpe:2.3:a:php:php:5.5.0:beta3
  • PHP 5.5.0 beta4
    cpe:2.3:a:php:php:5.5.0:beta4
  • PHP 5.5.0 release candidate 1
    cpe:2.3:a:php:php:5.5.0:rc1
  • PHP 5.5.0 release candidate 2
    cpe:2.3:a:php:php:5.5.0:rc2
  • PHP 5.5.1
    cpe:2.3:a:php:php:5.5.1
  • PHP 5.5.2
    cpe:2.3:a:php:php:5.5.2
  • PHP 5.5.3
    cpe:2.3:a:php:php:5.5.3
  • PHP 5.5.4
    cpe:2.3:a:php:php:5.5.4
  • PHP 5.5.5
    cpe:2.3:a:php:php:5.5.5
  • PHP 5.5.6
    cpe:2.3:a:php:php:5.5.6
  • PHP 5.5.7
    cpe:2.3:a:php:php:5.5.7
  • PHP 5.5.8
    cpe:2.3:a:php:php:5.5.8
  • PHP 5.5.9
    cpe:2.3:a:php:php:5.5.9
  • PHP 5.5.10
    cpe:2.3:a:php:php:5.5.10
  • PHP 5.5.11
    cpe:2.3:a:php:php:5.5.11
  • PHP 5.5.12
    cpe:2.3:a:php:php:5.5.12
  • PHP 5.5.13
    cpe:2.3:a:php:php:5.5.13
  • PHP 5.5.14
    cpe:2.3:a:php:php:5.5.14
  • PHP 5.5.15
    cpe:2.3:a:php:php:5.5.15
  • PHP 5.5.16
    cpe:2.3:a:php:php:5.5.16
  • PHP 5.5.17
    cpe:2.3:a:php:php:5.5.17
  • PHP 5.5.18
    cpe:2.3:a:php:php:5.5.18
  • PHP 5.5.19
    cpe:2.3:a:php:php:5.5.19
  • PHP 5.5.20
    cpe:2.3:a:php:php:5.5.20
  • PHP 5.5.21
    cpe:2.3:a:php:php:5.5.21
  • PHP 5.5.22
    cpe:2.3:a:php:php:5.5.22
  • PHP 5.5.23
    cpe:2.3:a:php:php:5.5.23
  • PHP 5.5.24
    cpe:2.3:a:php:php:5.5.24
  • PHP 5.5.25
    cpe:2.3:a:php:php:5.5.25
  • PHP 5.5.26
    cpe:2.3:a:php:php:5.5.26
  • PHP 5.5.27
    cpe:2.3:a:php:php:5.5.27
  • PHP 5.5.28
    cpe:2.3:a:php:php:5.5.28
  • PHP PHP 5.5.29
    cpe:2.3:a:php:php:5.5.29
  • PHP 5.5.30
    cpe:2.3:a:php:php:5.5.30
  • PHP 5.5.31
    cpe:2.3:a:php:php:5.5.31
  • PHP 5.5.32
    cpe:2.3:a:php:php:5.5.32
  • PHP 5.5.33
    cpe:2.3:a:php:php:5.5.33
  • PHP 5.5.34
    cpe:2.3:a:php:php:5.5.34
  • PHP 5.5.35
    cpe:2.3:a:php:php:5.5.35
  • PHP 5.5.36
    cpe:2.3:a:php:php:5.5.36
  • PHP 5.5.37
    cpe:2.3:a:php:php:5.5.37
  • PHP 5.5.38
    cpe:2.3:a:php:php:5.5.38
  • PHP 5.6.0
    cpe:2.3:a:php:php:5.6.0
  • PHP 5.6.0 alpha1
    cpe:2.3:a:php:php:5.6.0:alpha1
  • PHP 5.6.0 alpha2
    cpe:2.3:a:php:php:5.6.0:alpha2
  • PHP 5.6.0 alpha3
    cpe:2.3:a:php:php:5.6.0:alpha3
  • PHP 5.6.0 alpha4
    cpe:2.3:a:php:php:5.6.0:alpha4
  • PHP 5.6.0 alpha5
    cpe:2.3:a:php:php:5.6.0:alpha5
  • PHP 5.6.0 beta1
    cpe:2.3:a:php:php:5.6.0:beta1
  • PHP 5.6.0 beta2
    cpe:2.3:a:php:php:5.6.0:beta2
  • PHP 5.6.0 beta3
    cpe:2.3:a:php:php:5.6.0:beta3
  • PHP 5.6.0 beta4
    cpe:2.3:a:php:php:5.6.0:beta4
  • PHP PHP 5.6.1
    cpe:2.3:a:php:php:5.6.1
  • PHP 5.6.2
    cpe:2.3:a:php:php:5.6.2
  • PHP 5.6.3
    cpe:2.3:a:php:php:5.6.3
  • PHP 5.6.4
    cpe:2.3:a:php:php:5.6.4
  • PHP 5.6.5
    cpe:2.3:a:php:php:5.6.5
  • PHP 5.6.6
    cpe:2.3:a:php:php:5.6.6
  • PHP 5.6.7
    cpe:2.3:a:php:php:5.6.7
  • PHP PHP 5.6.8
    cpe:2.3:a:php:php:5.6.8
  • PHP PHP 5.6.9
    cpe:2.3:a:php:php:5.6.9
  • PHP PHP 5.6.10
    cpe:2.3:a:php:php:5.6.10
  • PHP PHP 5.6.11
    cpe:2.3:a:php:php:5.6.11
  • PHP PHP 5.6.12
    cpe:2.3:a:php:php:5.6.12
  • PHP PHP 5.6.13
    cpe:2.3:a:php:php:5.6.13
  • PHP 5.6.14
    cpe:2.3:a:php:php:5.6.14
  • PHP 5.6.15
    cpe:2.3:a:php:php:5.6.15
  • PHP 5.6.16
    cpe:2.3:a:php:php:5.6.16
  • PHP 5.6.17
    cpe:2.3:a:php:php:5.6.17
  • PHP 5.6.18
    cpe:2.3:a:php:php:5.6.18
  • PHP 5.6.19
    cpe:2.3:a:php:php:5.6.19
  • PHP 5.6.20
    cpe:2.3:a:php:php:5.6.20
  • PHP 5.6.21
    cpe:2.3:a:php:php:5.6.21
  • PHP 5.6.22
    cpe:2.3:a:php:php:5.6.22
  • PHP 5.6.23
    cpe:2.3:a:php:php:5.6.23
  • PHP 5.6.24
    cpe:2.3:a:php:php:5.6.24
  • PHP 5.6.25
    cpe:2.3:a:php:php:5.6.25
  • PHP 5.6.26
    cpe:2.3:a:php:php:5.6.26
  • PHP 5.6.27
    cpe:2.3:a:php:php:5.6.27
  • PHP 5.6.28
    cpe:2.3:a:php:php:5.6.28
  • PHP 5.6.29
    cpe:2.3:a:php:php:5.6.29
  • PHP 5.6.30
    cpe:2.3:a:php:php:5.6.30
  • PHP 5.6.31
    cpe:2.3:a:php:php:5.6.31
  • PHP 5.6.32
    cpe:2.3:a:php:php:5.6.32
  • PHP 5.6.33
    cpe:2.3:a:php:php:5.6.33
  • PHP 5.6.34
    cpe:2.3:a:php:php:5.6.34
  • PHP 5.6.36
    cpe:2.3:a:php:php:5.6.36
  • PHP 7.0.0
    cpe:2.3:a:php:php:7.0.0
  • PHP 7.0.1
    cpe:2.3:a:php:php:7.0.1
  • PHP 7.0.2
    cpe:2.3:a:php:php:7.0.2
  • PHP 7.0.3
    cpe:2.3:a:php:php:7.0.3
  • PHP 7.0.4
    cpe:2.3:a:php:php:7.0.4
  • PHP 7.0.5
    cpe:2.3:a:php:php:7.0.5
  • PHP 7.0.6
    cpe:2.3:a:php:php:7.0.6
  • PHP 7.0.7
    cpe:2.3:a:php:php:7.0.7
  • PHP 7.0.8
    cpe:2.3:a:php:php:7.0.8
  • PHP 7.0.9
    cpe:2.3:a:php:php:7.0.9
  • PHP 7.0.10
    cpe:2.3:a:php:php:7.0.10
  • PHP 7.0.11
    cpe:2.3:a:php:php:7.0.11
  • PHP 7.0.12
    cpe:2.3:a:php:php:7.0.12
  • PHP 7.0.13
    cpe:2.3:a:php:php:7.0.13
  • PHP 7.0.14
    cpe:2.3:a:php:php:7.0.14
  • PHP 7.0.15
    cpe:2.3:a:php:php:7.0.15
  • PHP 7.0.16
    cpe:2.3:a:php:php:7.0.16
  • PHP 7.0.17
    cpe:2.3:a:php:php:7.0.17
  • PHP 7.0.18
    cpe:2.3:a:php:php:7.0.18
  • PHP 7.0.19
    cpe:2.3:a:php:php:7.0.19
  • PHP 7.0.20
    cpe:2.3:a:php:php:7.0.20
  • PHP 7.0.21
    cpe:2.3:a:php:php:7.0.21
  • PHP 7.0.22
    cpe:2.3:a:php:php:7.0.22
  • PHP 7.0.23
    cpe:2.3:a:php:php:7.0.23
  • PHP 7.0.24
    cpe:2.3:a:php:php:7.0.24
  • PHP 7.0.25
    cpe:2.3:a:php:php:7.0.25
  • PHP 7.0.26
    cpe:2.3:a:php:php:7.0.26
  • PHP 7.0.27
    cpe:2.3:a:php:php:7.0.27
  • PHP 7.0.28
    cpe:2.3:a:php:php:7.0.28
  • PHP 7.0.29
    cpe:2.3:a:php:php:7.0.29
  • PHP 7.0.30
    cpe:2.3:a:php:php:7.0.30
  • PHP 7.1.0
    cpe:2.3:a:php:php:7.1.0
  • PHP 7.1.1
    cpe:2.3:a:php:php:7.1.1
  • PHP 7.1.2
    cpe:2.3:a:php:php:7.1.2
  • PHP 7.1.3
    cpe:2.3:a:php:php:7.1.3
  • PHP 7.1.4
    cpe:2.3:a:php:php:7.1.4
  • PHP 7.1.5
    cpe:2.3:a:php:php:7.1.5
  • PHP 7.1.6
    cpe:2.3:a:php:php:7.1.6
  • PHP 7.1.7
    cpe:2.3:a:php:php:7.1.7
  • PHP 7.1.8
    cpe:2.3:a:php:php:7.1.8
  • PHP 7.1.9
    cpe:2.3:a:php:php:7.1.9
  • PHP 7.1.10
    cpe:2.3:a:php:php:7.1.10
  • PHP 7.1.11
    cpe:2.3:a:php:php:7.1.11
  • PHP 7.1.12
    cpe:2.3:a:php:php:7.1.12
  • PHP 7.1.13
    cpe:2.3:a:php:php:7.1.13
  • PHP 7.1.14
    cpe:2.3:a:php:php:7.1.14
  • PHP 7.1.15
    cpe:2.3:a:php:php:7.1.15
  • PHP 7.1.16
    cpe:2.3:a:php:php:7.1.16
  • PHP 7.1.17
    cpe:2.3:a:php:php:7.1.17
  • PHP 7.1.18
    cpe:2.3:a:php:php:7.1.18
  • PHP 7.1.19
    cpe:2.3:a:php:php:7.1.19
  • PHP 7.2.0
    cpe:2.3:a:php:php:7.2.0
  • PHP 7.2.1
    cpe:2.3:a:php:php:7.2.1
  • PHP 7.2.2
    cpe:2.3:a:php:php:7.2.2
  • PHP 7.2.3
    cpe:2.3:a:php:php:7.2.3
  • PHP 7.2.4
    cpe:2.3:a:php:php:7.2.4
  • PHP 7.2.5
    cpe:2.3:a:php:php:7.2.5
  • PHP 7.2.6
    cpe:2.3:a:php:php:7.2.6
  • PHP 7.2.7
    cpe:2.3:a:php:php:7.2.7
  • Canonical Ubuntu Linux 12.04 ESM (Extended Security Maintenance)
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:-:-:esm
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • cpe:2.3:a:netapp:storage_automation_store
    cpe:2.3:a:netapp:storage_automation_store
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-190
CAPEC
  • Forced Integer Overflow
    This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
nessus via4
  • NASL family Misc.
    NASL id SECURITYCENTER_5_7_1_TNS_2018_12.NASL
    description According to its self-reported version, the Tenable SecurityCenter application installed on the remote host is prior to 5.7.1. It is, therefore, affected by multiple vulnerabilities. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 117672
    published 2018-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117672
    title Tenable SecurityCenter < 5.7.1 Multiple Vulnerabilities (TNS-2018-12)
  • NASL family CGI abuses
    NASL id PHP_7_1_20.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.1.x prior to 7.1.20. It is, therefore, affected by a denial of service vulnerability.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 111231
    published 2018-07-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111231
    title PHP 7.1.x < 7.1.20 exif_thumbnail_extract() DoS
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1066.NASL
    description exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, and 7.1.x before 7.1.20, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.(CVE-2018-14851) An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, and 7.1.x before 7.1.20. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.(CVE-2018-14883)
    last seen 2019-02-21
    modified 2018-10-04
    plugin id 112093
    published 2018-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112093
    title Amazon Linux AMI : php56 / php70,php71 (ALAS-2018-1066)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1490.NASL
    description Two vulnerabilities have been discovered in php5, a server-side, HTML-embedded scripting language. One (CVE-2018-14851) results in a potential denial of service (out-of-bounds read and application crash) via a crafted JPEG file. The other (CVE-2018-14883) is an Integer Overflow that leads to a heap-based buffer over-read. Additionally, a previously introduced patch for CVE-2017-7272 was found to negatively affect existing PHP applications (#890266). As a result of the negative effects and the fact that the security team has marked the CVE in question as 'ignore,' the patch has been dropped. For Debian 8 'Jessie', these problems have been fixed in version 5.6.37+dfsg-0+deb8u1. We recommend that you upgrade your php5 packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-10-04
    plugin id 112229
    published 2018-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112229
    title Debian DLA-1490-1 : php5 security update
  • NASL family CGI abuses
    NASL id PHP_7_2_8.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.8. It is, therefore, affected by a Use-After-Free Arbitrary Code Execution Vulnerability.
    last seen 2019-02-21
    modified 2018-09-20
    plugin id 111216
    published 2018-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111216
    title PHP 7.2.x < 7.2.8 Use After Free Arbitrary Code Execution in EXIF
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3766-1.NASL
    description It was discovered that PHP incorrectly handled restarting certain child processes when php-fpm is used. A remote attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2015-9253) It was discovered that PHP incorrectly handled certain exif tags in JPEG images. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2018-14851, CVE-2018-14883). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 117539
    published 2018-09-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117539
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : php5, php7.0, php7.2 vulnerabilities (USN-3766-1)
  • NASL family CGI abuses
    NASL id PHP_7_0_31.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.0.x prior to 7.0.31. It is, therefore, affected by a Use-After-Free Arbitrary Code Execution Vulnerability.
    last seen 2019-02-21
    modified 2018-09-20
    plugin id 111215
    published 2018-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111215
    title PHP 7.0.x < 7.0.31 Use After Free Arbitrary Code Execution in EXIF
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1067.NASL
    description exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.(CVE-2018-14851) exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.(CVE-2018-12882) An issue was discovered in PHP 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.(CVE-2018-14883)
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 112094
    published 2018-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112094
    title Amazon Linux AMI : php72 (ALAS-2018-1067)
  • NASL family CGI abuses
    NASL id PHP_5_6_37_MULTIPLE.NASL
    description This plugin has been deprecated due to prior coverage
    last seen 2018-10-04
    modified 2018-09-20
    plugin id 117340
    published 2018-09-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117340
    title PHP < 5.6.37 or 7.2.x < 7.2.8 Multiple Vulnerabilities (Deprecated)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4353.NASL
    description Multiple security issues were found in PHP, a widely-used open source general purpose scripting language: The EXIF module was susceptible to denial of service/information disclosure when parsing malformed images, the Apache module allowed cross-site-scripting via the body of a 'Transfer-Encoding: chunked' request and the IMAP extension performed insufficient input validation which can result in the execution of arbitrary shell commands in the imap_open() function and denial of service in the imap_mail() function.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 119561
    published 2018-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119561
    title Debian DSA-4353-1 : php7.0 - security update
  • NASL family CGI abuses
    NASL id PHP_5_6_37.NASL
    description According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.37. It is, therefore, affected by a denial of service vulnerability.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 111230
    published 2018-07-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111230
    title PHP 5.6.x < 5.6.37 exif_thumbnail_extract() DoS
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-2681-1.NASL
    description This update for php53 fixes the following issues : The following security issues were fixed : CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE, which could be exploited by an attacker via crafted JPG files, and could result in an application crash. (bsc#1103659) CVE-2018-14883: Fixed an integer overflow leading to a heap-based buffer over-read in exif_thumbnail_extract of exif.c. (bsc#1103836) CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a crafted preg_replace call (bsc#1105466) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 117449
    published 2018-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117449
    title SUSE SLES11 Security Update : php53 (SUSE-SU-2018:2681-1)
refmap via4
bid 104871
confirm
debian DSA-4353
mlist [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
ubuntu
  • USN-3766-1
  • USN-3766-2
Last major update 03-08-2018 - 09:29
Published 03-08-2018 - 09:29
Last modified 05-03-2019 - 13:35
Back to Top