CVE-2017-4441 - Unpatched PHP Version Vulnerability

UNKNOWN No Patch (2837 days)

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

PHP is a widely-used open-source web scripting language. This vulnerability allows attackers to execute arbitrary code on your server by exploiting a buffer overflow in the PHP interpreter. If you're using an unpatched version of PHP, you're at risk of being exploited.

Am I affected?

You're affected if you use PHP versions prior to 7.1.0.
Check with: php -v | grep version
Note: This is not a PHP version check, but rather a command to verify the installed PHP version. If you don't know what version of PHP you're using, this command can help.

Affected Products

PHP Group / PHP

How to fix

To fix this vulnerability, update to PHP 7.1.0 or later.
You can download the latest PHP version from:
- Official PHP website: https://www.php.net/downloads
Alternatively, if you use a package manager like yum or apt, you can upgrade using:
- yum: sudo yum install php
- apt: sudo apt-get update && sudo apt-get install php