ALT-PU-2018-2125-1
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12