Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11048

Опубликовано: 14 мая 2020
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.

A flaw was found in PHP under a non-default configuration, where it was vulnerable to integer wraparounds during the reception of a multipart POST request. This flaw allows a remote attacker to repeatedly crash PHP and fill the filesystem with temporary PHP files, resulting in a denial of service.

Отчет

The severity of this issue is considered Moderate because it requires an unlikely large post_max_size to be configured.

Меры по смягчению последствий

Ensure that post_max_size is set to a value less than 2GB, or remains default.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpOut of support scope
Red Hat Enterprise Linux 5php53Out of support scope
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpWill not fix
Red Hat Enterprise Linux 8php:7.2/phpWill not fix
Red Hat Software Collectionsrh-php72-phpWill not fix
Red Hat Enterprise Linux 8phpFixedRHSA-2020:366208.09.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php73-phpFixedRHSA-2020:527501.12.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-php73-phpFixedRHSA-2020:527501.12.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-php73-phpFixedRHSA-2020:527501.12.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1837842php: Integer wraparounds when receiving multipart forms

EPSS

Процентиль: 95%
0.21786
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 5 лет назад

In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.

CVSS3: 5.3
nvd
около 5 лет назад

In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.

CVSS3: 5.3
debian
около 5 лет назад

In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below ...

suse-cvrf
почти 5 лет назад

Security update for php7

suse-cvrf
почти 5 лет назад

Security update for php7

EPSS

Процентиль: 95%
0.21786
Средний

7.5 High

CVSS3