First published: Mon Mar 11 2019(Updated: )
** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php5 | ||
debian/php7.0 | ||
debian/php7.3 | ||
PHP | >=7.0.0<7.1.27 | |
PHP | >=7.3.0<7.3.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-9675.
CVE-2019-9675 has a severity level of high.
Versions of PHP before 7.1.27 and 7.3.x before 7.3.3 are affected by CVE-2019-9675.
To fix the CVE-2019-9675 vulnerability, you should update PHP to version 7.1.27 or higher for PHP 7.x and to version 7.3.3 or higher for PHP 7.3.x.
Yes, you can find references for CVE-2019-9675 at the following links: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html).