CVE-2022-31626Classic Buffer Overflow in Group PHP

Severity
8.8HIGHNVD
CNA7.5
EPSS
10.2%
top 6.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 16
Latest updateJul 7

Description

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDphp/php7.4.07.4.30+2
CVEListV5php_group/php7.4.X7.4.30+2

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

6
OSV
php7.2 regression2022-07-07
OSV
php7.0 vulnerabilities2022-07-04
GHSA
GHSA-jfc6-9gw3-fhfg: In PHP versions 72022-06-17
OSV
CVE-2022-31626: In PHP versions 72022-06-16
CVEList
mysqlnd/pdo password buffer overflow2022-06-16

📋Vendor Advisories

5
Ubuntu
PHP vulnerabilities2022-07-04
Ubuntu
PHP vulnerabilities2022-06-15
Microsoft
mysqlnd/pdo password buffer overflow2022-06-14
Red Hat
php: password of excessive length triggers buffer overflow leading to RCE2022-05-16
Debian
CVE-2022-31626: php7.4 - In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, w...2022
CVE-2022-31626 — Classic Buffer Overflow in Group PHP | cvebase