CVE-2019-11042

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html Third Party Advisory
http://seclists.org/fulldisclosure/2019/Oct/15 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Oct/55 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3299 Third Party Advisory
https://bugs.php.net/bug.php?id=78256 Exploit Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Oct/9 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/35 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/38 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190822-0003/ Third Party Advisory
https://support.apple.com/kb/HT210634 Third Party Advisory
https://support.apple.com/kb/HT210722 Third Party Advisory
https://usn.ubuntu.com/4097-1/ Third Party Advisory
https://usn.ubuntu.com/4097-2/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4527 Third Party Advisory
https://www.debian.org/security/2019/dsa-4529 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html Third Party Advisory
http://seclists.org/fulldisclosure/2019/Oct/15 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Oct/55 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3299 Third Party Advisory
https://bugs.php.net/bug.php?id=78256 Exploit Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Oct/9 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/35 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/38 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190822-0003/ Third Party Advisory
https://support.apple.com/kb/HT210634 Third Party Advisory
https://support.apple.com/kb/HT210722 Third Party Advisory
https://usn.ubuntu.com/4097-1/ Third Party Advisory
https://usn.ubuntu.com/4097-2/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4527 Third Party Advisory
https://www.debian.org/security/2019/dsa-4529 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-08-09 20:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11042

Mitre link : CVE-2019-11042

CVE.ORG link : CVE-2019-11042


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • software_collections

tenable

  • tenable.sc

opensuse

  • leap

apple

  • mac_os_x

php

  • php

canonical

  • ubuntu_linux
CWE
CWE-125

Out-of-bounds Read