Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11236: CWE-787 Out-of-bounds Write in PHP Group PHP

0
Critical
VulnerabilityCVE-2024-11236cvecve-2024-11236cwe-787
Published: Sun Nov 24 2024 (11/24/2024, 00:44:54 UTC)
Source: CVE Database V5
Vendor/Project: PHP Group
Product: PHP

Description

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:17:17 UTC

Technical Analysis

CVE-2024-11236 is a critical security vulnerability identified in the PHP ldap_escape() function, present in PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, and 8.3.* before 8.3.14. The flaw specifically affects 32-bit systems where the function processes uncontrolled long string inputs. Due to improper handling of input length, an integer overflow occurs, which results in an out-of-bounds write (CWE-787). This memory corruption can lead to arbitrary code execution, denial of service, or other unpredictable behavior. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by its CVSS vector (AV:N/AC:L/PR:N/UI:N). The ldap_escape() function is commonly used to sanitize LDAP queries, so applications that accept user input for LDAP operations and run on vulnerable PHP versions are at risk. Although no exploits are currently known in the wild, the critical CVSS score of 9.8 reflects the high potential impact on confidentiality, integrity, and availability. The vulnerability affects a broad range of PHP versions widely deployed in web servers and applications, especially on 32-bit platforms which are still in use in some legacy or embedded environments. The lack of patch links in the provided data suggests that patches are either newly released or imminent, emphasizing the need for rapid update once available. This vulnerability highlights the importance of secure input validation and memory safety in core language libraries.

Potential Impact

For European organizations, the impact of CVE-2024-11236 can be severe. Many enterprises and service providers in Europe rely on PHP for web applications, content management systems, and internal tools. Exploitation could lead to full system compromise, data breaches involving sensitive personal or corporate data, service outages, and reputational damage. Organizations running 32-bit PHP environments, including legacy systems, are particularly vulnerable. The breach of confidentiality could expose customer data protected under GDPR, leading to regulatory penalties. Integrity violations could allow attackers to modify application behavior or data, while availability impacts could disrupt critical business operations. The vulnerability’s remote exploitability without authentication increases the attack surface, enabling attackers to target exposed web services directly. Given the widespread use of PHP in hosting environments across Europe, the threat could affect a large number of organizations, from SMEs to large enterprises and public sector entities. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential exploitation.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately inventory all PHP deployments to identify versions 8.1.*, 8.2.*, and 8.3.* running on 32-bit systems. 2) Apply official PHP patches or upgrade to PHP 8.1.31, 8.2.26, or 8.3.14 or later as soon as they become available. 3) For environments where immediate patching is not feasible, implement network-level restrictions to limit access to vulnerable services, especially those handling LDAP queries. 4) Audit application code to minimize use of ldap_escape() with untrusted input or implement additional input validation and length checks before passing data to this function. 5) Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to reduce exploitation success. 6) Monitor logs and network traffic for unusual LDAP-related activity or crashes that may indicate exploitation attempts. 7) Engage with hosting providers and third-party vendors to ensure their PHP environments are patched. 8) Educate development and operations teams about the risks of integer overflows and memory corruption vulnerabilities in critical libraries. These targeted steps go beyond generic patching advice by focusing on risk reduction in LDAP input handling and legacy 32-bit environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
php
Date Reserved
2024-11-15T06:27:40.425Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092616fe7723195e0b35c8

Added to database: 11/3/2025, 10:00:54 PM

Last enriched: 11/3/2025, 11:17:17 PM

Last updated: 11/5/2025, 2:10:43 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats