CVE Vulnerabilities

CVE-2021-21702

NULL Pointer Dereference

Published: Feb 15, 2021 | Modified: Dec 10, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Php Php 7.3.0 (including) 7.3.27 (excluding)
Php Php 7.4.0 (including) 7.4.15 (excluding)
Php Php 8.0.0 (including) 8.0.2 (excluding)
Red Hat Enterprise Linux 8 RedHat php:7.4-8050020210526053050.3e6e7e84 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-php73-php-0:7.3.29-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat rh-php73-php-0:7.3.29-1.el7 *
Php5 Ubuntu precise/esm *
Php5 Ubuntu trusty *
Php5 Ubuntu trusty/esm *
Php7.0 Ubuntu esm-infra/xenial *
Php7.0 Ubuntu xenial *
Php7.2 Ubuntu bionic *
Php7.4 Ubuntu focal *
Php7.4 Ubuntu groovy *
Php7.4 Ubuntu upstream *
Php8.0 Ubuntu upstream *

Potential Mitigations

References