Bug 1573802 (CVE-2018-10546) - CVE-2018-10546 php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service
Summary: CVE-2018-10546 php: Infinite loop in ext/iconv/iconv.c when using stream filt...
Status: NEW
Alias: CVE-2018-10546
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20180426,repor...
Keywords: Security
Depends On: 1578432 1578433 1578434 1563859 1573816 1578435
Blocks: 1574650 1573818
TreeView+ depends on / blocked
Reported: 2018-05-02 09:52 UTC by Adam Mariš
Modified: 2019-05-16 08:19 UTC (History)
11 users (show)

An infinite loop vulnerability was found in ext/iconv/iconv.c in PHP due to the iconv stream not rejecting invalid multibyte sequences. A remote attacker could use this vulnerability to hang the php process and consume resources.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Adam Mariš 2018-05-02 09:52:06 UTC
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.

Upstream bug:


Upstream patch:


Comment 1 Adam Mariš 2018-05-02 10:04:59 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1573816]

Comment 7 Riccardo Schirone 2018-05-15 15:16:46 UTC
The versions of PHP as provided by Red Hat Enterprise Linux 5, 6 and 7, though they do contain the vulnerable code, cannot be used to trigger the vulnerability with the linked test case. In the provided versions, php://memory stream changed the way it reads data, but we do not exclude other ways to trigger the vulnerability still exist.

Comment 9 Pim Rupert 2018-05-23 15:10:25 UTC
Is there any update on releasing updated packages for PHP on RHEL 7? (I have no access to the four linked issues.)

Note You need to log in before you can comment on or make changes to this bug.