First published: Tue Jan 21 2020(Updated: )
A flaw was found in php before 7.4.2. An out of bounds read in php_strip_tags_ex may lead to denial of service or potentially disclosure of sensitive data. Upstream issue: <a href="https://bugs.php.net/79099">https://bugs.php.net/79099</a>
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php73-php | <0:7.3.20-1.el7 | 0:7.3.20-1.el7 |
redhat/php | <7.4.2 | 7.4.2 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 | |
PHP | <7.2.27 | 7.2.27 |
PHP | >=7.2.0<7.2.27 | |
PHP | >=7.3.0<7.3.14 | |
PHP | >=7.4.0<7.4.2 | |
tenable tenable.sc | <5.19.0 | |
Oracle Communications Diameter Signaling Router | >=8.0<=8.4 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7059 is a vulnerability in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14, and 7.4.x below 7.4.2 that allows an attacker to cause the fgetss() function to read past the allocated buffer, leading to information disclosure or crash.
The severity of CVE-2020-7059 is critical with a CVSS score of 9.1.
You can check if your PHP version is affected by CVE-2020-7059 by comparing it with the vulnerable versions: 7.2.x below 7.2.27, 7.3.x below 7.3.14, and 7.4.x below 7.4.2.
To fix CVE-2020-7059, you need to update your PHP version to at least 7.2.27, 7.3.14, or 7.4.2, depending on the branch you are using.
You can find more information about CVE-2020-7059 in the references provided: [Reference 1](https://bugs.php.net/79099), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1797777), [Reference 3](http://git.php.net/?p=php-src.git;a=commit;h=0f79b1bf301f455967676b5129240140c5c45b09).