vulnerability
CentOS Linux: CVE-2023-3247: Important: php security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Jul 22, 2023 | Nov 1, 2023 | Jan 28, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jul 22, 2023
Added
Nov 1, 2023
Modified
Jan 28, 2025
Description
In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce.
Solutions
centos-upgrade-apcu-panelcentos-upgrade-libzipcentos-upgrade-libzip-debuginfocentos-upgrade-libzip-debugsourcecentos-upgrade-libzip-develcentos-upgrade-libzip-toolscentos-upgrade-libzip-tools-debuginfocentos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-bcmath-debuginfocentos-upgrade-php-clicentos-upgrade-php-cli-debuginfocentos-upgrade-php-commoncentos-upgrade-php-common-debuginfocentos-upgrade-php-dbacentos-upgrade-php-dba-debuginfocentos-upgrade-php-dbgcentos-upgrade-php-dbg-debuginfocentos-upgrade-php-debuginfocentos-upgrade-php-debugsourcecentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-embedded-debuginfocentos-upgrade-php-enchantcentos-upgrade-php-enchant-debuginfocentos-upgrade-php-fficentos-upgrade-php-ffi-debuginfocentos-upgrade-php-fpmcentos-upgrade-php-fpm-debuginfocentos-upgrade-php-gdcentos-upgrade-php-gd-debuginfocentos-upgrade-php-gmpcentos-upgrade-php-gmp-debuginfocentos-upgrade-php-intlcentos-upgrade-php-intl-debuginfocentos-upgrade-php-ldapcentos-upgrade-php-ldap-debuginfocentos-upgrade-php-mbstringcentos-upgrade-php-mbstring-debuginfocentos-upgrade-php-mysqlndcentos-upgrade-php-mysqlnd-debuginfocentos-upgrade-php-odbccentos-upgrade-php-odbc-debuginfocentos-upgrade-php-opcachecentos-upgrade-php-opcache-debuginfocentos-upgrade-php-pdocentos-upgrade-php-pdo-debuginfocentos-upgrade-php-pearcentos-upgrade-php-pecl-apcucentos-upgrade-php-pecl-apcu-debuginfocentos-upgrade-php-pecl-apcu-debugsourcecentos-upgrade-php-pecl-apcu-develcentos-upgrade-php-pecl-rrdcentos-upgrade-php-pecl-rrd-debuginfocentos-upgrade-php-pecl-rrd-debugsourcecentos-upgrade-php-pecl-xdebug3centos-upgrade-php-pecl-xdebug3-debuginfocentos-upgrade-php-pecl-xdebug3-debugsourcecentos-upgrade-php-pecl-zipcentos-upgrade-php-pecl-zip-debuginfocentos-upgrade-php-pecl-zip-debugsourcecentos-upgrade-php-pgsqlcentos-upgrade-php-pgsql-debuginfocentos-upgrade-php-processcentos-upgrade-php-process-debuginfocentos-upgrade-php-snmpcentos-upgrade-php-snmp-debuginfocentos-upgrade-php-soapcentos-upgrade-php-soap-debuginfocentos-upgrade-php-xmlcentos-upgrade-php-xml-debuginfo
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.