Uncontrolled Long String Inputs to ldap_escape() Function on 32-bit Systems Can Cause Integer Overflow and Out-of-Bounds Write
CVE-2024-11236

9.8CRITICAL

Key Information:

Vendor
PHP
Status
Vendor
CVE Published:
24 November 2024

What is CVE-2024-11236?

CVE-2024-11236 is a significant vulnerability affecting certain versions of the PHP programming language. PHP is widely used for web development, enabling dynamic content and interaction on websites. This vulnerability pertains to the ldap_escape() function, where uncontrolled long string inputs can lead to an integer overflow on 32-bit systems. The implications of this vulnerability can be severe, as it may allow attackers to manipulate memory and potentially execute harmful actions, thereby compromising the security of applications built using PHP.

Technical Details

This vulnerability is categorized under uncontrolled long string inputs being processed by the ldap_escape() function. In specific versions of PHP (8.1.* before 8.1.31, 8.2.* before 8.2.26, and 8.3.* before 8.3.14), the flaw manifests primarily on 32-bit systems. An integer overflow occurs, leading to an out-of-bounds write. This technical issue can compromise application stability and integrity, presenting an avenue for exploitation by attackers.

Potential Impact of CVE-2024-11236

  1. Memory Manipulation: This vulnerability can lead to memory corruption due to out-of-bounds writes, which can allow attackers to craft targeted inputs that manipulate application behavior, leading to possible unauthorized actions.

  2. Remote Code Execution: If successfully exploited, this vulnerability might enable an attacker to execute arbitrary code within the context of the application, potentially allowing full control over the affected system.

  3. Denial-of-Service (DoS): Exploiting this vulnerability could lead to application crashes or instability, resulting in a denial-of-service for legitimate users, causing disruption in business operations.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.