First published: Wed Mar 10 2021(Updated: )
Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook HHVM | <4.56.3 | |
Facebook HHVM | >=4.57.0<4.80.2 | |
Facebook HHVM | >=4.81.0<4.93.2 | |
Facebook HHVM | =4.94.0 | |
Facebook HHVM | =4.95.0 | |
Facebook HHVM | =4.96.0 | |
Facebook HHVM | =4.97.0 | |
Facebook HHVM | =4.98.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-1919.
The severity of CVE-2020-1919 is high, with a severity value of 7.5.
CVE-2020-1919 affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, and 4.98.0.
CVE-2020-1919 occurs due to incorrect bounds calculations in the substr_compare function, leading to an out-of-bounds read when the second string argument passed in is longer than the first.
To fix CVE-2020-1919, it is recommended to update HHVM to a version that is not affected by the vulnerability.