Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11038

Опубликовано: 18 июн. 2019
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

Отчет

In order to successfully exploit this vulnerability, the following prerequisites must be fulfilled:

  • An attacker needs to supply a maliciously crafted XBM image designed to exploit the uninitialized variable in the gdImageCreateFromXbm() function.
  • The application or service must accept and process XBM images using the vulnerable gdImageCreateFromXbm() function.
  • User interaction is required to process the malicious XBM file. It's important to note that successful exploitation requires that the application processes untrusted XBM image data using the vulnerable function. As this is not common practice, RH ProdSec has set the Impact of this vulnerability to "Low"

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5gdOut of support scope
Red Hat Enterprise Linux 5phpOut of support scope
Red Hat Enterprise Linux 5php53Out of support scope
Red Hat Enterprise Linux 6gdOut of support scope
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7gdFix deferred
Red Hat Enterprise Linux 7phpFix deferred
Red Hat Enterprise Linux 8gdFix deferred
Red Hat Enterprise Linux 8php:7.2/phpNot affected
Red Hat Software Collectionsrh-php70-phpFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1724149gd: Information disclosure in gdImageCreateFromXbm()

EPSS

Процентиль: 92%
0.09212
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
nvd
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
debian
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Libr ...

CVSS3: 5.3
github
около 3 лет назад

When using gdImageCreateFromXbm() function of gd extension in versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации

EPSS

Процентиль: 92%
0.09212
Низкий

3.3 Low

CVSS3