7.5
CVSSv3

CVE-2018-10546

Published: 29/04/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in PHP prior to 5.6.36, 7.0.x prior to 7.0.30, 7.1.x prior to 7.1.17, and 7.2.x prior to 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

canonical ubuntu linux 17.10

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

debian debian linux 8.0

debian debian linux 9.0

netapp storage automation store -

Vendor Advisories

Synopsis Moderate: rh-php71-php security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php71-php is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabilit ...
Several security issues were fixed in PHP ...
Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language: CVE-2018-7584 Buffer underread in parsing HTTP responses CVE-2018-10545 Dumpable FPM child processes allowed the bypass of opcache access controls CVE-2018-10546 Denial of service via infinite loop in converticonv stream filter ...
Null pointer dereference due to mishandling of ldap_get_dn return value allows denial-of-service by malicious LDAP server or man-in-the-middle attackerAn issue was discovered in PHP before 5636, 70x before 7030, 71x before 7117, and 72x before 725 ext/ldap/ldapc allows remote LDAP servers to cause a denial of service (NULL pointer d ...
An infinite loop vulnerability was found in ext/iconv/iconvc in PHP due to the iconv stream not rejecting invalid multibyte sequences A remote attacker could use this vulnerability to hang the php process and consume resources ...
SecurityCenter leverages third-party software to help provide underlying functionality Two separate third-party components (PHP and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address ...

Github Repositories

CVE-2018-10546 A user can create specially crafted data that, when processed using a stream filter with 'converticonv*', will cause the target application to enter an infinite loop and consume excessive CPU resources [CVE-2018-10546] The specific impact of these vulnerabilities depends on the applications that use the affected functions or services