Search for vulnerabilities
Vulnerability details: VCID-dm7d-pqtn-aaae
Vulnerability ID VCID-dm7d-pqtn-aaae
Aliases CVE-2018-7584
Summary In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
Status Published
Exploitability 2.0
Weighted Severity 8.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7584.html
generic_textual Low http://php.net/ChangeLog-7.php
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1112
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7584.json
epss 0.17789 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.17789 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.17789 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75304 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75725 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75725 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.75725 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.76185 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80024 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80024 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.80145 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.81512 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.81512 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.81512 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.81512 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.81512 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
epss 0.82214 https://api.first.org/data/v1/epss?cve=CVE-2018-7584
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1551039
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10549
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
cvssv3 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-7584
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-7584
generic_textual Medium https://ubuntu.com/security/notices/USN-3600-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3600-2
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7584.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7584.json
https://api.first.org/data/v1/epss?cve=CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
1551039 https://bugzilla.redhat.com/show_bug.cgi?id=1551039
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-7584 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/44846.txt
CVE-2018-7584 https://nvd.nist.gov/vuln/detail/CVE-2018-7584
RHSA-2020:1112 https://access.redhat.com/errata/RHSA-2020:1112
Data source Exploit-DB
Date added June 6, 2018
Description PHP 7.2.2 - 'php_stream_url_wrap_http_ex' Buffer Overflow
Ransomware campaign use Known
Source publication date June 6, 2018
Exploit type dos
Platform php
Source update date June 6, 2018
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7584.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7584
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7584
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.96133
EPSS Score 0.17789
Published At Dec. 19, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.