Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9675

Опубликовано: 08 фев. 2019
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

Отчет

Red Hat Product Security determined that this flaw was not a security vulnerability. See the Bugzilla link for more details.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Enterprise Linux 6phpNot affected
Red Hat Enterprise Linux 7phpNot affected
Red Hat Enterprise Linux 8php:7.2/phpNot affected
Red Hat Software Collectionsrh-php70-phpNot affected
Red Hat Software Collectionsrh-php71-phpNot affected
Red Hat Software Collectionsrh-php72-phpNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1688947php: buffer overflow in ext/phar/tar.c

EPSS

Процентиль: 59%
0.00389
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 6 лет назад

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

CVSS3: 8.1
nvd
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS3: 8.1
debian
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3. ...

CVSS3: 8.1
github
около 3 лет назад

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

CVSS3: 8.1
fstec
больше 6 лет назад

Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00389
Низкий

3.7 Low

CVSS3

Уязвимость CVE-2019-9675