Page 10 of 67 results (0.020 seconds)

CVSS: 9.8EPSS: 75%CPEs: 11EXPL: 1

In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string. En PHP hasta la versión 5.6.33, versiones 7.0.x anteriores a la 7.0.28, versiones 7.1.x hasta la 7.1.14 y versiones 7.2.x hasta la 7.2.2, hay una sublectura de búfer basada en pila al analizar una respuesta HTTP en la función php_stream_url_wrap_http_ex en ext/standard/http_fopen_wrapper.c. Esto resulta en la copia de una cadena larga. PHP version 7.2.2 contains a memory corruption bug while parsing malformed HTTP response packets. • https://www.exploit-db.com/exploits/44846 http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=75981 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://usn.ubuntu.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 4

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility. Se ha descubierto un problema en PHP en versiones 7.3.x anteriores a la 7.3.0alpha3, versiones 7.2.x anteriores a la 7.2.8 y anteriores a la 7.1.20. El proceso maestro php-fpm reinicia un proceso hijo en un bucle infinito cuando se utilizan funciones de ejecución de programas (por ejemplo, passthru, exec, shell_exec o system) con un flujo non-blocking-STDIN y consumir el espacio del disco con un gran volumen de logs de error, tal y como queda demostrado con un ataque a un cliente de una instalación de alojamiento compartido. • https://bugs.php.net/bug.php?id=70185 https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287 https://bugs.php.net/bug.php?id=75968 https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22 https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8 https://usn.ubuntu.com/3766-1 https://usn.ubuntu.com/4279-1 https://www.futureweb.at/security/CVE-2015-9253 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.1EPSS: 62%CPEs: 9EXPL: 0

An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file. Se ha descubierto un problema en PHP en versiones anteriores a la 5.6.33, versiones 7.0.x anteriores a la 7.0.27, versiones 7.1.x anteriores a la 7.1.13 y versiones 7.2.x anteriores a la 7.2.1. Hay XSS reflejado en la página de error PHAR 404 mediante el URI de una petición de un archivo .phar. • http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74782 https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://usn.ubuntu.com/3566-1 https://usn.ubuntu.com/3600-1 https:/&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 2

gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx. gd_gif_in.c en GD Graphics Library (también conocida como libgd), tal y como se emplea en PHP en versiones anteriores a la 5.6.33, versiones 7.0.x anteriores a la 7.0.27, versiones 7.1.x anteriores a la 7.1.13 y versiones 7.2.x anteriores a la 7.2.1, tiene un error en la propiedad signedness de un número entero que conduce a un bucle infinito mediante un archivo GIF manipulado, tal y como demuestra una llamada a las funciones de PHP imagecreatefromgif o imagecreatefromstring. Esto se relaciona con GetCode_ y gdImageCreateFromGifCtx. • https://github.com/huzhenghui/Test-7-2-0-PHP-CVE-2018-5711 https://github.com/huzhenghui/Test-7-2-1-PHP-CVE-2018-5711 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=75571 https://lists.debian.org/debian-lts-announce/2018/01/msg00022.html https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html https:/ • CWE-681: Incorrect Conversion between Numeric Types CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 1

In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145. En PHP, en versiones anteriores a la 5.6.32, versiones 7.x anteriores a la 7.0.25 y versiones 7.1.x anteriores a la 7.1.11, un error en la manipulación de timelib_meridian de la extensión de fecha de las directivas "front of" y "back of" podría ser empleado por atacantes capaces de proporcionar cadenas de fechas para filtrar información del intérprete. Esto está relacionado con lecturas fuera de límites de ext/date/lib/parse_date.c que afectan a la función php_parse_date. NOTA: este problema es diferente de CVE-2017-11145. • https://www.exploit-db.com/exploits/43133 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=75055 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001 • CWE-125: Out-of-bounds Read •