9.8
CVSSv3

CVE-2017-8923

Published: 12/05/2017 Updated: 20/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The zend_string_extend function in Zend/zend_string.h in PHP up to and including 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

Vendor Advisories

Debian Bug report logs - #881538 php70: CVE-2017-8923: Overflowing the length of string causes crash Package: src:php70; Maintainer for src:php70 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 12 Nov 2017 21:36:01 UTC Severity: im ...
Several security issues were fixed in PHP ...
Several security issues were fixed in PHP ...
Several security issues were fixed in PHP ...
The zend_string_extend function in Zend/zend_stringh in PHP through 715 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of = with a long string ...
PAN-SA-2024-0001 Informational Bulletin: Impact of OSS CVEs in PAN-OS ...
PAN-SA-2024-0004 Informational Bulletin: OSS CVEs fixed in PAN-OS ...