CVE-2019-9675Improper Restriction of Operations within the Bounds of a Memory Buffer in PHP

Severity
8.1HIGHNVD
OSV7.5
EPSS
0.5%
top 34.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11
Latest updateMay 14

Description

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

NVDphp/php7.0.07.1.27+1
Ubuntuphp5/php5< 5.5.9+dfsg-1ubuntu4.29
NVDopensuse/leap42.3

Also affects: Ubuntu Linux 12.04, 14.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-pf47-4qf3-xq2x: ** DISPUTED ** An issue was discovered in PHP 72022-05-14
OSV
php5 vulnerabilities2019-04-23
CVEList
CVE-2019-9675: An issue was discovered in PHP 72019-03-11
OSV
CVE-2019-9675: An issue was discovered in PHP 72019-03-11

📋Vendor Advisories

3
Ubuntu
PHP vulnerabilities2019-04-25
Ubuntu
PHP vulnerabilities2019-04-23
Red Hat
php: buffer overflow in ext/phar/tar.c2019-02-08

💬Community

1
Bugzilla
CVE-2019-9675 php: buffer overflow in ext/phar/tar.c2019-03-14