{"id":"CVE-2018-14884","details":"An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.","modified":"2026-05-08T16:08:43.478370Z","published":"2018-08-03T13:29:00.317Z","references":[{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20181107-0003/"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=75535"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"d4635050668ce40c31a9dbd130b2b7b02ff33934"},{"introduced":"0221e9f827632942225586687a33cfd554860d5e"},{"fixed":"bdce64e151b0f9352a17f6a0279d4e62da6f6ee9"},{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"13e2cbebb8d58c5131a795a3752c4a0f181b0f23"}],"database_specific":{"cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"7.0.0"},{"fixed":"7.0.27"},{"introduced":"7.1.0"},{"fixed":"7.1.13"},{"introduced":"7.2.0"},{"fixed":"7.2.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14884.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}