First published: Mon Nov 12 2018(Updated: )
Fixed bug (Heap Buffer Overflow (READ: 4) in phar_parse_pharfile). (CVE-2018-20783)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
redhat/rh-php72-php | <0:7.2.24-1.el7 | 0:7.2.24-1.el7 |
redhat/php | <5.6.39 | 5.6.39 |
redhat/php | <7.0.33 | 7.0.33 |
redhat/php | <7.1.25 | 7.1.25 |
redhat/php | <7.2.13 | 7.2.13 |
redhat/php | <7.3.0 | 7.3.0 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.3 | ||
PHP | <7.0.33 | 7.0.33 |
PHP | <5.6.39 | |
PHP | >=7.0.0<7.0.33 | |
PHP | >=7.1.0<7.1.25 | |
PHP | >=7.2.0<7.2.13 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-20783 is a fixed bug that involves a heap buffer overflow in the phar_parse_pharfile function in PHP.
CVE-2018-20783 affects PHP versions before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13.
The severity of CVE-2018-20783 is high, with a severity score of 7.5.
To fix CVE-2018-20783, upgrade PHP to version 5.6.39, 7.0.33, 7.1.25, or 7.2.13.
You can find more information about CVE-2018-20783 at the following references: [link 1](https://bugs.php.net/bug.php?id=77143), [link 2](http://git.php.net/?p=php-src.git;a=commitdiff;h=e7c8e6cde021afd637ea535b0641a1851e57fb2a), [link 3](https://access.redhat.com/errata/RHSA-2019:2519).