漏洞信息详情
PHP 缓冲区错误漏洞
漏洞简介
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHPGroup和开放源代码社区的共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。
PHP中的mbstring正则表达式函数存在缓冲区溢出漏洞。攻击者可借助无效的多字节数据利用该漏洞造成内存损坏/泄露。以下版本受到影响:PHP 5.6.40之前版本,7.1.26之前的7.x版本,7.2.14之前的7.2.x版本,7.3.1之前的7.3.x版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
http://www.php.net/
参考网址
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
来源:MISC
链接:https://bugs.php.net/bug.php?id=77418
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190321-0001/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
来源:BID
链接:https://www.securityfocus.com/bid/107156
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77394
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77385
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77382
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77381
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77371
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77370
来源:UBUNTU
链接:https://usn.ubuntu.com/3902-1/
来源:BID
链接:http://www.securityfocus.com/bid/107156
来源:UBUNTU
链接:https://usn.ubuntu.com/3902-2/
来源:CONFIRM
链接:https://support.f5.com/csp/article/K06372014
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77380
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77249
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=77242
来源:www.php.net
链接:http://www.php.net/
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4398
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3299
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3300
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/3902-1/
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4398
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/151919/Debian-Security-Advisory-4398-1.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-api-connects-developer-portal-is-impacted-by-vulnerabilities-in-php/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1500/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/76646
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/151994/Ubuntu-Security-Notice-USN-3902-1.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9023
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107156
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/76286
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152064/Ubuntu-Security-Notice-USN-3902-2.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157463/Red-Hat-Security-Advisory-2020-1624-01.html
受影响实体
暂无
补丁
- PHP 缓冲区错误漏洞的修复措施<!--2019-2-22-->
还没有评论,来说两句吧...