First published: Wed Jun 05 2019(Updated: )
It was discovered that PHP incorrectly handled certain exif tags in images. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2019-11036) It was discovered that PHP incorrectly decoding certain MIME headers. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2019-11039) It was discovered that PHP incorrectly handled certain exif tags in images. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-11040)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.19-0ubuntu0.19.04.1 | 7.2.19-0ubuntu0.19.04.1 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/php7.2-cgi | <7.2.19-0ubuntu0.19.04.1 | 7.2.19-0ubuntu0.19.04.1 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/php7.2-cli | <7.2.19-0ubuntu0.19.04.1 | 7.2.19-0ubuntu0.19.04.1 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/php7.2-fpm | <7.2.19-0ubuntu0.19.04.1 | 7.2.19-0ubuntu0.19.04.1 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.19-0ubuntu0.18.10.1 | 7.2.19-0ubuntu0.18.10.1 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/php7.2-cgi | <7.2.19-0ubuntu0.18.10.1 | 7.2.19-0ubuntu0.18.10.1 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/php7.2-cli | <7.2.19-0ubuntu0.18.10.1 | 7.2.19-0ubuntu0.18.10.1 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/php7.2-fpm | <7.2.19-0ubuntu0.18.10.1 | 7.2.19-0ubuntu0.18.10.1 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.19-0ubuntu0.18.04.1 | 7.2.19-0ubuntu0.18.04.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-cgi | <7.2.19-0ubuntu0.18.04.1 | 7.2.19-0ubuntu0.18.04.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-cli | <7.2.19-0ubuntu0.18.04.1 | 7.2.19-0ubuntu0.18.04.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-fpm | <7.2.19-0ubuntu0.18.04.1 | 7.2.19-0ubuntu0.18.04.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libapache2-mod-php7.0 | <7.0.33-0ubuntu0.16.04.5 | 7.0.33-0ubuntu0.16.04.5 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-cgi | <7.0.33-0ubuntu0.16.04.5 | 7.0.33-0ubuntu0.16.04.5 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-cli | <7.0.33-0ubuntu0.16.04.5 | 7.0.33-0ubuntu0.16.04.5 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-fpm | <7.0.33-0ubuntu0.16.04.5 | 7.0.33-0ubuntu0.16.04.5 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-4009-1 is high.
The vulnerability in USN-4009-1 allows a remote attacker to cause PHP to crash, resulting in a denial of service or possibly obtain sensitive information.
The versions of libapache2-mod-php7.2 affected by the vulnerability in USN-4009-1 are 7.2.19-0ubuntu0.19.04.1, 7.2.19-0ubuntu0.18.10.1, and 7.2.19-0ubuntu0.18.04.1.
The recommended remedies for the vulnerability in USN-4009-1 are to update to version 7.2.19-0ubuntu0.19.04.1 for libapache2-mod-php7.2, php7.2-cgi, php7.2-cli, and php7.2-fpm.
You can find more information about the vulnerability in USN-4009-1 on the Ubuntu website.