CVE-2019-9675
Published: March 11, 2019Last modified: November 9, 2023
Description
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 8.1 | 
| Attack Vector | NETWORK | 
| Attack complexity | HIGH | 
| Privileges required | NONE | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | php81 | Not affected (8.1.22-r0) | 
| Stream | php81 | Not affected (8.1.22-r0) | 
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- https://usn.ubuntu.com/3922-2/
- https://usn.ubuntu.com/3922-3/