Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11145 : What You Need to Know

Learn about CVE-2017-11145, a vulnerability in PHP versions prior to 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, allowing attackers to exploit the date extension's parsing code for information disclosure.

In versions prior to PHP 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a vulnerability in the date extension's timelib_meridian parsing code could be exploited by malicious individuals to potentially lead to information disclosure from the interpreter.

Understanding CVE-2017-11145

This CVE details a vulnerability in PHP versions that could allow attackers to exploit the date extension's parsing code.

What is CVE-2017-11145?

The vulnerability involves out-of-bounds read access in ext/date/lib/parse_date.c, affecting the php_parse_date function. The correct fix for this issue is included in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit.

The Impact of CVE-2017-11145

The vulnerability could be used by attackers to leak information from the interpreter by providing malicious date strings.

Technical Details of CVE-2017-11145

This section provides more technical insights into the CVE.

Vulnerability Description

The vulnerability in PHP versions before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7 allows attackers to perform out-of-bounds reads affecting the php_parse_date function.

Affected Systems and Versions

        PHP versions prior to 5.6.31
        PHP 7.x before 7.0.21
        PHP 7.1.x before 7.1.7

Exploitation Mechanism

Attackers with the ability to provide date strings can exploit this vulnerability to disclose information from the interpreter.

Mitigation and Prevention

Protecting systems from CVE-2017-11145 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply the correct fix included in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit
        Monitor for any suspicious activities related to date string inputs

Long-Term Security Practices

        Keep PHP versions updated to the latest secure releases
        Implement input validation mechanisms to prevent malicious date string inputs

Patching and Updates

Regularly check for PHP security advisories and apply patches promptly to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now