{"id":"CVE-2018-7584","details":"In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.","modified":"2026-04-16T01:41:19.238618245Z","published":"2018-03-01T19:29:00.293Z","related":["SUSE-SU-2018:0646-1","SUSE-SU-2018:0717-1","SUSE-SU-2018:0806-1"],"references":[{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103204"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041607"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3600-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3600-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4240"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/44846/"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-03"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-12"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=75981"},{"type":"FIX","url":"https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/44846/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"523f230c831d7b33353203fa34aee4e92ac12bba"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"523f230c831d7b33353203fa34aee4e92ac12bba"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-7584.json","vanir_signatures":[{"digest":{"length":20763,"function_hash":"235742458703237748127320784434867975092"},"id":"CVE-2018-7584-541194b9","signature_type":"Function","deprecated":false,"source":"https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba","signature_version":"v1","target":{"file":"ext/standard/http_fopen_wrapper.c","function":"php_stream_url_wrap_http_ex"}},{"source":"https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba","deprecated":false,"signature_type":"Line","id":"CVE-2018-7584-7c6044be","digest":{"line_hashes":["302318251668703795837139744017837865352","333173997746499205889019872887678987232","118657766010197903785616399644239149972","335074228026685228301729749727312645254","307651456529529732890967808800659929599","18705976883196675039183171683314468822"],"threshold":0.9},"signature_version":"v1","target":{"file":"ext/standard/http_fopen_wrapper.c"}}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}