First published: Tue Jan 21 2020(Updated: )
A flaw was found in php before 7.4.2. A global buffer overflow in mbfl_filt_conv_big5_wchar function may lead to corruption of memory data. Upstream issue: <a href="http://bugs.php.net/79037">http://bugs.php.net/79037</a>
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php73-php | <0:7.3.20-1.el7 | 0:7.3.20-1.el7 |
PHP PHP | >=7.2.0<7.2.27 | |
PHP PHP | >=7.3.0<7.3.14 | |
PHP PHP | >=7.4.0<7.4.2 | |
Tenable Tenable.sc | <5.19.0 | |
Oracle Communications Diameter Signaling Router | >=8.0<=8.4 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
PHP PHP | <7.2.27 | 7.2.27 |
redhat/php | <7.4.2 | 7.4.2 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7060 is a fixed bug (global buffer-overflow in `mbfl_filt_conv_big5_wchar`).
The severity of CVE-2020-7060 is critical with a CVSS score of 9.1.
PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14, and 7.4.x below 7.4.2 are affected by CVE-2020-7060.
CVE-2020-7060 can be exploited by supplying data that will cause the function `mbfl_filt_conv_big5_wchar` to read past the allocated buffer, leading to information disclosure.
To fix CVE-2020-7060, PHP versions 7.2.27, 7.3.14, and 7.4.2 should be installed, depending on the PHP version being used.