[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1283 --- php71 php73

ID: oval:org.secpod.oval:def:1601052Date: (C)2019-09-27   (M)2024-04-17
Class: PATCHFamily: unix




When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.A use-after-free in onig_new_deluxe in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

Platform:
Amazon Linux AMI
Product:
php71
php73
Reference:
ALAS-2019-1283
CVE-2019-11042
CVE-2019-13224
CVE-2019-11041
CVE    3
CVE-2019-13224
CVE-2019-11042
CVE-2019-11041
CPE    3
cpe:/o:amazon:linux
cpe:/a:php:php71
cpe:/a:php:php73

© SecPod Technologies