Описание
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Ссылки
- ExploitThird Party Advisory
- Mailing List
- Mailing List
- Third Party Advisory
- ExploitThird Party Advisory
- Mailing List
- Mailing List
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
9.4 Critical
CVSS3
9.8 Critical
CVSS3
Дефекты
Связанные уязвимости
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* bef ...
Buffer overflow and overread in phar_dir_read()
Уязвимость функции phar_dir_read() интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS
9.4 Critical
CVSS3
9.8 Critical
CVSS3