CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
Published
2018-02-19T19:29:00.483
Last Modified
2024-11-21T02:40:09.483
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 6.5 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:N/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: COMPLETE
Exploitability Score
8.0
Impact Score
6.9
Weaknesses
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
php
|
php
|
< 7.1.20 |
Yes
|
Application |
php
|
php
|
< 7.2.8 |
Yes
|
Application |
php
|
php
|
7.3.0 |
Yes
|
Application |
php
|
php
|
7.3.0 |
Yes
|
References
-
https://bugs.php.net/bug.php?id=70185
Exploit, Issue Tracking, Vendor Advisory
([email protected])
-
https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
Exploit, Issue Tracking, Vendor Advisory
([email protected])
-
https://bugs.php.net/bug.php?id=75968
Exploit, Issue Tracking, Vendor Advisory
([email protected])
-
https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
Third Party Advisory
([email protected])
-
https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
Patch, Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/3766-1/
Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/4279-1/
([email protected])
-
https://www.futureweb.at/security/CVE-2015-9253/
Exploit, Third Party Advisory
([email protected])
-
https://bugs.php.net/bug.php?id=70185
Exploit, Issue Tracking, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
Exploit, Issue Tracking, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.php.net/bug.php?id=75968
Exploit, Issue Tracking, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/3766-1/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4279-1/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.futureweb.at/security/CVE-2015-9253/
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)