cvelist/2019/11xxx/CVE-2019-11042.json
2019-11-01 16:01:16 +00:00

177 lines
6.2 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"generator": {
"engine": "Vulnogram 0.0.7"
},
"CVE_data_meta": {
"ID": "CVE-2019-11042",
"ASSIGNER": "security@php.net",
"DATE_PUBLIC": "2019-07-30T03:21:00.000Z",
"TITLE": "heap-buffer-overflow on exif_process_user_comment in EXIF extension",
"AKA": "",
"STATE": "PUBLIC"
},
"source": {
"defect": [
"https://bugs.php.net/bug.php?id=78256"
],
"advisory": "",
"discovery": "EXTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHP Group",
"product": {
"product_data": [
{
"product_name": "PHP",
"version": {
"version_data": [
{
"version_value": "7.1.x below 7.1.31"
},
{
"version_value": "7.2.x below 7.2.21"
},
{
"version_value": "7.3.x below 7.3.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125 Out-of-bounds Read"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=78256",
"name": "https://bugs.php.net/bug.php?id=78256"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190812 [SECURITY] [DLA 1878-1] php5 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4097-2",
"url": "https://usn.ubuntu.com/4097-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4097-1",
"url": "https://usn.ubuntu.com/4097-1/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190822-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190822-0003/"
},
{
"refsource": "BUGTRAQ",
"name": "20190920 [SECURITY] [DSA 4527-1] php7.3 security update",
"url": "https://seclists.org/bugtraq/2019/Sep/35"
},
{
"refsource": "DEBIAN",
"name": "DSA-4527",
"url": "https://www.debian.org/security/2019/dsa-4527"
},
{
"refsource": "DEBIAN",
"name": "DSA-4529",
"url": "https://www.debian.org/security/2019/dsa-4529"
},
{
"refsource": "BUGTRAQ",
"name": "20190923 [SECURITY] [DSA 4529-1] php7.0 security update",
"url": "https://seclists.org/bugtraq/2019/Sep/38"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2271",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT210634",
"url": "https://support.apple.com/kb/HT210634"
},
{
"refsource": "BUGTRAQ",
"name": "20191008 APPLE-SA-2019-10-07-1 macOS Catalina 10.15",
"url": "https://seclists.org/bugtraq/2019/Oct/9"
},
{
"refsource": "FULLDISC",
"name": "20191008 APPLE-SA-2019-10-07-1 macOS Catalina 10.15",
"url": "http://seclists.org/fulldisclosure/2019/Oct/15"
},
{
"refsource": "FULLDISC",
"name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15",
"url": "http://seclists.org/fulldisclosure/2019/Oct/55"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3299",
"url": "https://access.redhat.com/errata/RHSA-2019:3299"
}
]
},
"configuration": [],
"impact": {
"cvss": {
"version": "3.0",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
}
},
"exploit": [],
"work_around": [],
"solution": [],
"credit": [
{
"lang": "eng",
"value": "By orestiskourides at gmail dot com"
}
]
}