9.8

CVE-2019-11043

Warnung
Exploit

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhpPhp Version >= 7.1.0 < 7.1.33
PhpPhp Version >= 7.2.0 < 7.2.24
PhpPhp Version >= 7.3.0 < 7.3.11
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
CanonicalUbuntu Linux Version19.10
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version29
FedoraprojectFedora Version30
FedoraprojectFedora Version31
TenableTenable.Sc Version < 5.19.0
RedhatSoftware Collections Version1.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version7.7
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatEnterprise Linux Eus Version8.6
RedhatEnterprise Linux Eus Version8.8
RedhatEnterprise Linux For Arm 64 Version8.0_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.1_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.2_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.4_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.6_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.8_aarch64

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability

Schwachstelle

In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.11% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
security@php.net 8.7 2.2 5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://seclists.org/fulldisclosure/2020/Jan/40
Third Party Advisory
Mailing List
https://bugs.php.net/bug.php?id=78599
Patch
Vendor Advisory
Exploit
Issue Tracking
https://github.com/neex/phuip-fpizdam
Third Party Advisory
Exploit
https://seclists.org/bugtraq/2020/Jan/44
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4166-1/
Third Party Advisory
https://usn.ubuntu.com/4166-2/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4552
Third Party Advisory
Mailing List
https://www.debian.org/security/2019/dsa-4553
Third Party Advisory
Mailing List