Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-9675

Опубликовано: 11 мар. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.3fixed7.3.3-1package
php7.0removedpackage
php5removedpackage

Примечания

  • Fixed in 7.1.27, 7.3.3

  • PHP Bug: https://bugs.php.net/bug.php?id=77586

EPSS

Процентиль: 59%
0.00389
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 6 лет назад

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

CVSS3: 3.7
redhat
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS3: 8.1
nvd
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS3: 8.1
github
около 3 лет назад

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

CVSS3: 8.1
fstec
больше 6 лет назад

Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00389
Низкий