CVE-2019-11048
Temporary files are not cleaned after OOM when parsing HTTP request data
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
En PHP versiones 7.2.x por debajo de 7.2.31, versiones 7.3.x por debajo de 7.3.18 y 7.4.x por debajo de 7.4.6, cuando son permitidas las descargas de archivos HTTP, el suministro de nombres de archivo o de campo demasiado largos podría conllevar al motor PHP a intentar asignar un almacenamiento de memoria sobredimensionado, alcanzar el límite de memoria y detener el procesamiento de la petición, sin limpiar los archivos temporales creados por la petición de descarga. Esto podría conllevar a la acumulación de archivos temporales sin limpiar que agotan el espacio de disco en el servidor de destino.
A flaw was found in PHP under a non-default configuration, where it was vulnerable to integer wraparounds during the reception of a multipart POST request. This flaw allows a remote attacker to repeatedly crash PHP and fill the filesystem with temporary PHP files, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-09 CVE Reserved
- 2020-05-20 CVE Published
- 2024-09-04 EPSS Updated
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20200528-0006 | X_refsource_confirm | |
https://www.oracle.com/security-alerts/cpuApr2021.html | X_refsource_misc | |
https://www.oracle.com/security-alerts/cpuoct2020.html | X_refsource_misc | |
https://www.tenable.com/security/tns-2021-14 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://bugs.php.net/bug.php?id=78875 | 2024-09-16 | |
https://bugs.php.net/bug.php?id=78876 | 2024-09-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.2.0 < 7.2.31 Search vendor "Php" for product "Php" and version " >= 7.2.0 < 7.2.31" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.3.0 < 7.3.18 Search vendor "Php" for product "Php" and version " >= 7.3.0 < 7.3.18" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.4.0 < 7.4.6 Search vendor "Php" for product "Php" and version " >= 7.4.0 < 7.4.6" | - |
Affected
|