ALT-PU-2020-2622-1
Closed vulnerabilities
                                                                                    Published: 2020-08-03
                                                                                    
                                                                                
                                                                            BDU:2021-01911
Уязвимость функции phar_parse_zipfile языка программирования php, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
                                                                                        
                                                                                        
                                                                                            Severity: LOW (3.6)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: LOW (3.3)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        
                                                                        
                                                                    
                                                                                    Published: 2020-09-09
Modified: 2024-11-21
                                                                            Modified: 2024-11-21
CVE-2020-7068
In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
                                                                                        
                                                                                        
                                                                                            Severity: LOW (3.3)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: LOW (3.6)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        - https://bugs.php.net/bug.php?id=79797
- https://security.gentoo.org/glsa/202009-10
- https://security.netapp.com/advisory/ntap-20200918-0005/
- https://www.debian.org/security/2021/dsa-4856
- https://www.tenable.com/security/tns-2021-14
- https://bugs.php.net/bug.php?id=79797
- https://security.gentoo.org/glsa/202009-10
- https://security.netapp.com/advisory/ntap-20200918-0005/
- https://www.debian.org/security/2021/dsa-4856
- https://www.tenable.com/security/tns-2021-14
