ALT-PU-2019-1676-1
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01249
Уязвимость функции imap_mail интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01270
Уязвимость функции в phph_handler интерфейса SAPI Apache2 интерпретатора PHP, связанная с некорректной нейтрализацией ввода при генерации веб-страницы, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-01271
Уязвимость компонента IMAP интерпретатора языка программирования PHP, позволяющая нарушителю выполнять произвольные команды в операционной системе
BDU:2019-01287
Уязвимость функции gdImageColorMatch (gd_color_match.c) графической библиотеки The GD Graphics Library, позволяющая нарушителю инициировать вызовы imagecolormatch
BDU:2019-01552
Уязвимость функции чтения PHAR интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01553
Уязвимость функции чтения PHAR dns_get_record интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01554
Уязвимость в интерпретаторе языка программирования PHP, связанная с чтением за пределами границ буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01555
Уязвимость функции xmlrpc_decode() расширения XMLRPC интерпретатора языка программирования PHP, связана с чтением данных за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01565
Уязвимость функции xml_elem_parse_buf() интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01570
Уязвимость интерпретатора PHP, связанная с ошибками управлением ключами, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03140
Уязвимость функции exif_process_SOFn расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03141
Уязвимость функции exif_process_IFD_in_MAKERNOTE расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03142
Уязвимость функции exif_process_IFD_in_MAKERNOTE расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2020-03214
Уязвимость функции phar_parse_pharfile (xt/phar/phar.c) интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-02393
Уязвимость компонента exif интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-17082
The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76582
- https://bugs.php.net/bug.php?id=76582
- https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
- https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
- [debian-lts-announce] 20180920 [SECURITY] [DLA 1509-1] php5 security update
- [debian-lts-announce] 20180920 [SECURITY] [DLA 1509-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180924-0001/
- https://security.netapp.com/advisory/ntap-20180924-0001/
- DSA-4353
- DSA-4353
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-19518
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
- 106018
- 106018
- 1042157
- 1042157
- https://antichat.com/threads/463395/#post-4254681
- https://antichat.com/threads/463395/#post-4254681
- https://bugs.debian.org/913775
- https://bugs.debian.org/913775
- https://bugs.debian.org/913835
- https://bugs.debian.org/913835
- https://bugs.debian.org/913836
- https://bugs.debian.org/913836
- https://bugs.php.net/bug.php?id=76428
- https://bugs.php.net/bug.php?id=76428
- https://bugs.php.net/bug.php?id=77153
- https://bugs.php.net/bug.php?id=77153
- https://bugs.php.net/bug.php?id=77160
- https://bugs.php.net/bug.php?id=77160
- https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17cdffe45adddb
- https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17cdffe45adddb
- https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php
- https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1700-1] uw-imap security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1700-1] uw-imap security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2866-1] uw-imap security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2866-1] uw-imap security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20181221-0004/
- https://security.netapp.com/advisory/ntap-20181221-0004/
- USN-4160-1
- USN-4160-1
- DSA-4353
- DSA-4353
- 45914
- 45914
- https://www.openwall.com/lists/oss-security/2018/11/22/3
- https://www.openwall.com/lists/oss-security/2018/11/22/3
Modified: 2024-11-21
CVE-2018-19935
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- 106143
- 106143
- https://bugs.php.net/bug.php?id=77020
- https://bugs.php.net/bug.php?id=77020
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181221-0003/
- https://security.netapp.com/advisory/ntap-20181221-0003/
- DSA-4353
- DSA-4353
Modified: 2024-11-21
CVE-2018-20783
In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77143
- https://bugs.php.net/bug.php?id=77143
- USN-3566-2
- USN-3566-2
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-6977
gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
- openSUSE-SU-2019:1148
- openSUSE-SU-2019:1140
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 106731
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2019-d7f8995451
- FEDORA-2019-ab7d22a466
- FEDORA-2019-7a06c0e6b4
- GLSA-201903-18
- https://security.netapp.com/advisory/ntap-20190315-0003/
- USN-3900-1
- DSA-4384
- 46677
- openSUSE-SU-2019:1148
- 46677
- DSA-4384
- USN-3900-1
- https://security.netapp.com/advisory/ntap-20190315-0003/
- GLSA-201903-18
- FEDORA-2019-7a06c0e6b4
- FEDORA-2019-ab7d22a466
- FEDORA-2019-d7f8995451
- FEDORA-2020-e795f92d79
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- https://bugs.php.net/bug.php?id=77270
- RHSA-2019:3299
- RHSA-2019:2519
- 106731
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-5.php
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- openSUSE-SU-2019:1140
Modified: 2024-11-21
CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77242
- https://bugs.php.net/bug.php?id=77249
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77249
- https://bugs.php.net/bug.php?id=77242
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9021
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 106747
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77247
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77247
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- 106747
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9022
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77369
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3922-2
- USN-3922-3
- DSA-4398
- https://www.tenable.com/security/tns-2019-07
- openSUSE-SU-2019:1572
- https://www.tenable.com/security/tns-2019-07
- DSA-4398
- USN-3922-3
- USN-3922-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77369
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
Modified: 2024-11-21
CVE-2019-9023
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77370
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77418
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://support.f5.com/csp/article/K06372014
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://support.f5.com/csp/article/K06372014
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77418
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77370
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9024
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77380
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77380
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9637
An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77630
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190502-0007/
- https://support.f5.com/csp/article/K53825211
- USN-3922-1
- USN-3922-2
- USN-3922-3
- DSA-4403
- https://www.tenable.com/security/tns-2019-07
- openSUSE-SU-2019:1293
- https://www.tenable.com/security/tns-2019-07
- DSA-4403
- USN-3922-3
- USN-3922-2
- USN-3922-1
- https://support.f5.com/csp/article/K53825211
- https://security.netapp.com/advisory/ntap-20190502-0007/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77630
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Modified: 2024-11-21
CVE-2019-9638
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77563
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190502-0007/
- USN-3922-1
- USN-3922-2
- USN-3922-3
- DSA-4403
- openSUSE-SU-2019:1293
- DSA-4403
- USN-3922-3
- USN-3922-2
- USN-3922-1
- https://security.netapp.com/advisory/ntap-20190502-0007/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77563
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Modified: 2024-11-21
CVE-2019-9639
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77659
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190502-0007/
- USN-3922-1
- USN-3922-2
- USN-3922-3
- DSA-4403
- openSUSE-SU-2019:1293
- DSA-4403
- USN-3922-3
- USN-3922-2
- USN-3922-1
- https://security.netapp.com/advisory/ntap-20190502-0007/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77659
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Modified: 2024-11-21
CVE-2019-9640
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77540
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190502-0007/
- USN-3922-1
- USN-3922-2
- USN-3922-3
- DSA-4403
- openSUSE-SU-2019:1293
- DSA-4403
- USN-3922-3
- USN-3922-2
- USN-3922-1
- https://security.netapp.com/advisory/ntap-20190502-0007/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77540
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Modified: 2024-11-21
CVE-2019-9641
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- https://bugs.php.net/bug.php?id=77509
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190502-0007/
- USN-3922-1
- USN-3922-2
- USN-3922-3
- DSA-4403
- openSUSE-SU-2019:1256
- DSA-4403
- USN-3922-3
- USN-3922-2
- USN-3922-1
- https://security.netapp.com/advisory/ntap-20190502-0007/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77509
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503