Updated: 2022-05-25 08:16:58.263287
Description:
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 5 |
CVSS Version 3.x | HIGH | 7.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
EL 6 PHP | php | 5.4 | 7.5 | HIGH | Released | 2022-09-16 11:02:17 | |
EL 6 PHP | php | 7.3 | 7.5 | HIGH | Not Vulnerable | 2022-08-17 11:02:13 | |
EL 6 PHP | php | 5.6 | 7.5 | HIGH | Released | 2022-09-16 11:02:17 | |
EL 6 PHP | php | 7.0 | 7.5 | HIGH | Released | 2022-09-16 11:02:17 | |
EL 6 PHP | php | 5.1 | 7.5 | HIGH | Released | 2022-08-12 08:02:08 | |
EL 6 PHP | php | 5.2 | 7.5 | HIGH | Released | 2022-08-12 14:02:14 | |
EL 6 PHP | php | 5.3 | 7.5 | HIGH | Released | 2022-08-11 17:02:15 | |
EL 6 PHP | php | 7.1 | 7.5 | HIGH | Released | 2022-09-16 11:02:17 | |
EL 6 PHP | php | 5.5 | 7.5 | HIGH | Released | 2022-09-16 11:02:17 | |
EL 6 PHP | php | 8.0 | 7.5 | HIGH | Not Vulnerable | 2022-09-16 11:02:11 |