First published: Tue Apr 14 2020(Updated: )
Fixed bug (OOB Read in urldecode()). (CVE-2020-7067)
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
<7.3.17 | 7.3.17 | |
PHP PHP | >=7.2.0<7.2.30 | |
PHP PHP | >=7.3.0<7.3.17 | |
PHP PHP | >=7.4.0<7.4.5 | |
Tenable Tenable.sc | <5.19.0 | |
Oracle Communications Diameter Signaling Router | >=8.0.0.0<=8.4.0.5 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/php7.3 | 7.3.31-1~deb10u1 7.3.31-1~deb10u5 | |
debian/php7.4 | 7.4.33-1+deb11u4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7067 is a vulnerability in PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17, and 7.4.x below 7.4.5 that allows the urldecode() function to access memory locations beyond the allocated memory.
The CVE-2020-7067 vulnerability can be exploited by making the urldecode() function access locations beyond the allocated memory, if PHP is compiled with EBCDIC support and incorrectly uses signed numbers as array indexes.
CVE-2020-7067 has a severity rating of 7.5 (high).
PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17, and 7.4.x below 7.4.5 are affected by CVE-2020-7067.
To fix the CVE-2020-7067 vulnerability, update PHP to version 7.2.30, 7.3.17, or 7.4.5 depending on the currently installed version.