Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9675

Опубликовано: 11 мар. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

not-affected

5.5.9+dfsg-1ubuntu4.29
precise/esm

not-affected

5.3.10-1ubuntu3.34
trusty

released

5.5.9+dfsg-1ubuntu4.29
trusty/esm

not-affected

5.5.9+dfsg-1ubuntu4.29
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

7.0.33-0ubuntu0.16.04.3
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

7.2.15-0ubuntu0.18.04.2
cosmic

released

7.2.15-0ubuntu0.18.10.2
devel

released

7.2.15-0ubuntu3
disco

released

7.2.15-0ubuntu3
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

7.2.15-0ubuntu0.18.04.2
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

7.2.16

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

not-affected

7.3.4-2
disco

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

7.3.3
xenial

DNE

Показывать по

EPSS

Процентиль: 59%
0.00389
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS3: 8.1
nvd
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS3: 8.1
debian
больше 6 лет назад

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3. ...

CVSS3: 8.1
github
около 3 лет назад

** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."

CVSS3: 8.1
fstec
больше 6 лет назад

Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00389
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Уязвимость CVE-2019-9675