Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9022

Опубликовано: 29 дек. 2018
Источник: redhat
CVSS3: 4.6
EPSS Низкий

Описание

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Software Collectionsrh-php70-phpFix deferred
Red Hat Enterprise Linux 8phpFixedRHSA-2020:162428.04.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php71-phpFixedRHSA-2019:251919.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php72-phpFixedRHSA-2019:329901.11.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSrh-php71-phpFixedRHSA-2019:251919.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSrh-php71-phpFixedRHSA-2019:251919.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSrh-php72-phpFixedRHSA-2019:329901.11.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-php71-phpFixedRHSA-2019:251919.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-php72-phpFixedRHSA-2019:329901.11.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-php72-phpFixedRHSA-2019:329901.11.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1685412php: memcpy with negative length via crafted DNS response

EPSS

Процентиль: 91%
0.07129
Низкий

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.

CVSS3: 7.5
nvd
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.

CVSS3: 7.5
debian
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, ...

CVSS3: 7.5
github
около 3 лет назад

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость функции чтения PHAR dns_get_record интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 91%
0.07129
Низкий

4.6 Medium

CVSS3