CVE-2019-9675
Ubuntu Security Notice USN-3922-3
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
** EN DISPUTA ** Se ha detectado un fallo en PHP, en las versiones 7.x anteriores a la 7.1.27 y en las 7.3.x anteriores a la 7.3.3. phar_tar_writeheaders_int tiene un desbordamiento de búfer mediante un valor de enlace largo. NOTA: el fabricante indica que el valor de enlace se utiliza solamente cuando un archivo contiene un symlink, algo que actualmente no puede ocurrir: "Este fallo facilita el compromiso teórico de la seguridad. Sin embargo, un ataque práctico es normalmente imposible."
USN-3922-1 fixed several vulnerabilities in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-03-11 CVE Reserved
- 2019-03-11 CVE Published
- 2024-08-04 CVE Updated
- 2025-04-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugs.php.net/bug.php?id=77586 | 2024-05-17 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html | 2024-05-17 | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html | 2024-05-17 | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html | 2024-05-17 | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html | 2024-05-17 | |
http://php.net/ChangeLog-7.php | 2024-05-17 | |
https://usn.ubuntu.com/3922-2 | 2024-05-17 | |
https://usn.ubuntu.com/3922-3 | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.0.0 < 7.1.27 Search vendor "Php" for product "Php" and version " >= 7.0.0 < 7.1.27" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.3.0 < 7.3.3 Search vendor "Php" for product "Php" and version " >= 7.3.0 < 7.3.3" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 42.3 Search vendor "Opensuse" for product "Leap" and version "42.3" | - |
Affected
|