Updated: 2024-11-24 05:50:13.526562
Description:
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 5 |
CVSS Version 3.x | HIGH | 7.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
Debian 10 | php | 5.6 | 7.5 | HIGH | Already Fixed | 2025-05-01 03:52:50 | ||
Debian 10 | php | 8.2 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:31 | ||
Debian 10 | php | 7.0 | 7.5 | HIGH | Already Fixed | 2025-05-02 03:53:30 | ||
Debian 10 | php | 7.3 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:26 | ||
Debian 10 | php | 7.4 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:27 | ||
Debian 10 | php | 8.0 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:29 | ||
Debian 10 | php | 8.1 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:30 | ||
Debian 10 | php | 7.2 | 7.5 | HIGH | Already Fixed | 2025-05-02 03:53:29 | ||
Debian 10 | php | 7.1 | 7.5 | HIGH | Already Fixed | 2025-05-02 03:53:30 | ||
Debian 11 | php | 8.2 | 7.5 | HIGH | Needs Triage | 2025-04-28 18:53:42 |