CVE-2019-11050

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=78793 Exploit Mailing List Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/
https://seclists.org/bugtraq/2020/Feb/27 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2020/Feb/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2021/Jan/3 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200103-0002/ Third Party Advisory
https://usn.ubuntu.com/4239-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4626 Third Party Advisory
https://www.debian.org/security/2020/dsa-4628 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=78793 Exploit Mailing List Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/
https://seclists.org/bugtraq/2020/Feb/27 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2020/Feb/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2021/Jan/3 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200103-0002/ Third Party Advisory
https://usn.ubuntu.com/4239-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4626 Third Party Advisory
https://www.debian.org/security/2020/dsa-4628 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-12-23 03:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11050

Mitre link : CVE-2019-11050

CVE.ORG link : CVE-2019-11050


JSON object : View

Products Affected

tenable

  • securitycenter

debian

  • debian_linux

fedoraproject

  • fedora

opensuse

  • leap

php

  • php

canonical

  • ubuntu_linux
CWE
CWE-125

Out-of-bounds Read