9.8

CVE-2019-9023

Exploit
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhpPhp Version < 5.6.40
PhpPhp Version >= 7.0.0 < 7.1.26
PhpPhp Version >= 7.2.0 < 7.2.14
PhpPhp Version >= 7.3.0 < 7.3.1
DebianDebian Linux Version9.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version16.04 SwEditionlts
OpensuseLeap Version42.3
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 10.5% 0.932
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-125 Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

http://www.securityfocus.com/bid/107156
Third Party Advisory
VDB Entry
https://usn.ubuntu.com/3902-1/
Third Party Advisory
https://usn.ubuntu.com/3902-2/
Third Party Advisory
https://bugs.php.net/bug.php?id=77370
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77371
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77381
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77382
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77385
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77394
Patch
Vendor Advisory
Exploit
Issue Tracking
https://bugs.php.net/bug.php?id=77418
Patch
Vendor Advisory
Exploit
Issue Tracking