The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
References
Link | Resource |
---|---|
https://github.com/swoole/swoole-src/commit/4cdbce5d9bf2fe596bb6acd7d6611f9e8c253a76 | Patch Vendor Advisory |
https://github.com/swoole/swoole-src/issues/1882 | Issue Tracking Vendor Advisory |
https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ | Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-18T02:00:00
Updated: 2018-08-21T15:57:01
Reserved: 2018-08-17T00:00:00
Link: CVE-2018-15503
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-18T02:29:01.903
Modified: 2018-11-08T20:49:48.653
Link: CVE-2018-15503
JSON object: View
Redhat Information
No data.
CWE