漏洞信息详情
PHP 缓冲区错误漏洞
漏洞简介
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHPGroup和开放源代码社区的共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。
PHP中的exif_process_user_comment存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.php.net/ChangeLog-7.php
参考网址
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Oct/9
来源:CONFIRM
链接:https://support.apple.com/kb/HT210634
来源:CONFIRM
链接:https://support.apple.com/kb/HT210722
来源:bugs.php.net
链接:https://bugs.php.net/bug.php?id=78256
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Sep/38
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4527
来源:UBUNTU
链接:https://usn.ubuntu.com/4097-2/
来源:UBUNTU
链接:https://usn.ubuntu.com/4097-1/
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4529
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3299
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190822-0003/
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2019/Oct/15
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Sep/35
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2019/Oct/55
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914158-1.html
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3299
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3300
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192243-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192270-1.html
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4097-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4097-1/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1500/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3073/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3272/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-11042
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021072292
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159094/Red-Hat-Security-Advisory-2020-3662-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2515
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/PHP-multiple-vulnerabilities-29928
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0741/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4296/
来源:support.apple.com
链接:https://support.apple.com/en-us/HT210722
来源:support.apple.com
链接:https://support.apple.com/en-us/HT210634
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-api-connects-developer-portal-is-impacted-by-vulnerabilities-in-php/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3072/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3349/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157463/Red-Hat-Security-Advisory-2020-1624-01.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-11042
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3111/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3332/
受影响实体
暂无
补丁
- PHP 缓冲区错误漏洞的修复措施<!--2019-8-1-->
还没有评论,来说两句吧...