CWE
787 122
Advisory Published
Updated

CVE-2019-3570

First published: Thu Jul 18 2019(Updated: )

Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series.

Credit: cve-assign@fb.com

Affected SoftwareAffected VersionHow to fix
HipHop Virtual Machine<=3.30.5
HipHop Virtual Machine>=4.0.0<=4.0.4
HipHop Virtual Machine=4.1.0
HipHop Virtual Machine=4.2.0
HipHop Virtual Machine=4.3.0
HipHop Virtual Machine=4.4.0
HipHop Virtual Machine=4.5.0
HipHop Virtual Machine=4.6.0
HipHop Virtual Machine=4.7.0
HipHop Virtual Machine=4.8.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-3570?

    CVE-2019-3570 is considered a high severity vulnerability due to its potential to cause heap corruption.

  • How do I fix CVE-2019-3570?

    To fix CVE-2019-3570, upgrade to HHVM version 4.9.0 or later, which addresses this vulnerability.

  • Which versions of HHVM are affected by CVE-2019-3570?

    CVE-2019-3570 affects HHVM versions up to and including 4.8.0 and the 3.30.5 version.

  • What type of vulnerability is CVE-2019-3570?

    CVE-2019-3570 is a heap corruption vulnerability caused by improper handling of parameters in the scrypt_enc() function.

  • Can an attacker exploit CVE-2019-3570 remotely?

    Yes, an attacker can exploit CVE-2019-3570 remotely if they can manipulate the parameters used in the scrypt_enc() function.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203