{"id":"CVE-2018-11386","details":"An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.","aliases":["GHSA-r2rq-3h56-fqm4"],"modified":"2026-04-11T12:06:46.511187Z","published":"2018-06-13T16:29:00.627Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4XNBMFW33H47O5TZGA7JYCVLDBCXAJV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBQK7JDXIELADIPGZIOUCZKMAJM5LSBW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WU5N2TZFNGXDGMXMPP7LZCWTFLENF6WH/"},{"type":"ADVISORY","url":"https://symfony.com/blog/cve-2018-11386-denial-of-service-when-using-pdosessionhandler"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4262"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"9975b1eca3de4db792a2c3e4e16f676a4aadcd46"},{"fixed":"34d6116e2b80351c5a6f591285a4e9381b0dd127"},{"introduced":"5615b92cd452cd54f1433a3f53de87c096a1107f"},{"fixed":"24fc640d544a67869a4106de5fc303c597398629"},{"introduced":"5a7e31c48e7cd4831efa409fffb661beb9995174"},{"fixed":"4639525c796227ec36652ad97192a5eb3de74f76"},{"introduced":"0a47db379b8cc74cdd84e1e6870fafc4a4ac8351"},{"fixed":"8eb567d8398ce31a402ea8db3e6b5b1faf121cbc"},{"introduced":"26ca7023b1c45dce951da7206ed70049267d27bc"},{"fixed":"a54fa082103acd599b7d5de9204dc1f4aa8a5615"}],"database_specific":{"extracted_events":[{"introduced":"2.7.0"},{"fixed":"2.7.48"},{"introduced":"2.8.0"},{"fixed":"2.8.41"},{"introduced":"3.3.0"},{"fixed":"3.3.17"},{"introduced":"3.4.0"},{"fixed":"3.4.11"},{"introduced":"4.0.0"},{"fixed":"4.0.11"}],"cpe":"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v2.7.0","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.15","v2.7.16","v2.7.17","v2.7.18","v2.7.19","v2.7.2","v2.7.20","v2.7.21","v2.7.22","v2.7.23","v2.7.24","v2.7.25","v2.7.26","v2.7.27","v2.7.28","v2.7.29","v2.7.3","v2.7.30","v2.7.31","v2.7.32","v2.7.33","v2.7.34","v2.7.35","v2.7.36","v2.7.37","v2.7.38","v2.7.39","v2.7.4","v2.7.40","v2.7.41","v2.7.42","v2.7.43","v2.7.44","v2.7.45","v2.7.46","v2.7.47","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.1","v2.8.10","v2.8.11","v2.8.12","v2.8.13","v2.8.14","v2.8.15","v2.8.16","v2.8.17","v2.8.18","v2.8.19","v2.8.2","v2.8.20","v2.8.21","v2.8.22","v2.8.23","v2.8.24","v2.8.25","v2.8.26","v2.8.27","v2.8.28","v2.8.29","v2.8.3","v2.8.30","v2.8.31","v2.8.32","v2.8.33","v2.8.34","v2.8.35","v2.8.36","v2.8.37","v2.8.38","v2.8.39","v2.8.4","v2.8.40","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.8.9","v3.3.0","v3.3.1","v3.3.10","v3.3.11","v3.3.12","v3.3.13","v3.3.14","v3.3.15","v3.3.16","v3.3.2","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.3.7","v3.3.8","v3.3.9","v3.4.0","v3.4.1","v3.4.10","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.4.7","v3.4.8","v3.4.9","v4.0.0","v4.0.1","v4.0.10","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.0.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-11386.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}