First published: Mon Feb 17 2020(Updated: )
A vulnerability was found in PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php73-php | <0:7.3.20-1.el7 | 0:7.3.20-1.el7 |
redhat/php | <7.2.9 | 7.2.9 |
redhat/php | <7.3.16 | 7.3.16 |
redhat/php | <7.4.4 | 7.4.4 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 | |
PHP | >=7.2.0<7.2.29 | |
PHP | >=7.3.0<7.3.16 | |
PHP | >=7.4.0<7.4.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
Tenable Tenable.sc | <5.19.0 | |
PHP | <7.2.29 | 7.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7064 is a vulnerability in PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16, and 7.4.x below 7.4.4 that allows malicious data to cause PHP to read uninitialized memory, potentially leading to information disclosure or a crash.
CVE-2020-7064 affects PHP by allowing malicious data to be parsed with the exif_read_data() function, leading to the potential reading of uninitialized memory.
The severity of CVE-2020-7064 is medium with a severity score of 5.4.
Fix CVE-2020-7064 by upgrading PHP to version 7.2.9 or above for PHP 7.2.x, version 7.3.16 or above for PHP 7.3.x, and version 7.4.4 or above for PHP 7.4.x.
More information about CVE-2020-7064 can be found at the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1820602), [PHP Bugs](https://bugs.php.net/bug.php?id=79282), [PHP Git Commit](http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff).