First published: Thu Dec 06 2018(Updated: )
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2018-20783">CVE-2018-20783</a>. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c. References: <a href="https://bugs.php.net/bug.php?id=77247">https://bugs.php.net/bug.php?id=77247</a> Upstrean commit: <a href="http://git.php.net/?p=php-src.git;a=commit;h=428d8164ffcf6f75a6cc9d4056e54bfd450dac03">http://git.php.net/?p=php-src.git;a=commit;h=428d8164ffcf6f75a6cc9d4056e54bfd450dac03</a> <a href="http://git.php.net/?p=php-src.git;a=commit;h=78bd3477745f1ada9578a79f61edb41886bec1cb">http://git.php.net/?p=php-src.git;a=commit;h=78bd3477745f1ada9578a79f61edb41886bec1cb</a> <a href="http://git.php.net/?p=php-src.git;a=commit;h=9d388b95c54ea053ce6f194defe1ff6673195747">http://git.php.net/?p=php-src.git;a=commit;h=9d388b95c54ea053ce6f194defe1ff6673195747</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
redhat/rh-php72-php | <0:7.2.24-1.el7 | 0:7.2.24-1.el7 |
redhat/php | <5.6.40 | 5.6.40 |
redhat/php | <7.1.26 | 7.1.26 |
redhat/php | <7.2.14 | 7.2.14 |
redhat/php | <7.3.1 | 7.3.1 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.3 | ||
PHP | <7.1.26 | 7.1.26 |
PHP | <5.6.40 | |
PHP | >=7.0.0<7.1.26 | |
PHP | >=7.2.0<7.2.14 | |
PHP | >=7.3.0<7.3.1 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
NetApp Storage Automation Store | ||
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-9021 is a vulnerability in PHP versions before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1 that allows an attacker to read allocated or unallocated memory through a heap-based buffer over-read in PHAR reading functions.
The severity of CVE-2019-9021 is critical with a CVSS score of 9.8.
CVE-2019-9021 can affect PHP versions before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1 by allowing an attacker to read memory beyond the intended data.
To fix CVE-2019-9021, you should update your PHP installation to version 5.6.40, 7.1.26, 7.2.14, or 7.3.1 or later, depending on the affected version.
You can find more information about CVE-2019-9021 in the PHP ChangeLog and the Red Hat Security Advisory linked in the references.