漏洞信息详情
PHP 加密问题漏洞
漏洞简介
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHPGroup和开放源代码社区的共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。
PHP 7.2.0版本、7.3.0版本和7.4.0版本中存在加密问题漏洞,该漏洞源于网络系统或产品未正确使用相关密码算法,导致内容未正确加密、弱加密、明文存储敏感信息等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.php.net/ChangeLog-7.php
参考网址
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20201016-0001/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html
来源:MISC
链接:https://bugs.php.net/bug.php?id=79601
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202012-16
来源:CONFIRM
链接:https://www.tenable.com/security/tns-2021-14
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4856
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/
来源:UBUNTU
链接:https://usn.ubuntu.com/4583-1/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-7069
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0606
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2608
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/PHP-information-disclosure-via-AES-CCM-Encryption-33466
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164839/Red-Hat-Security-Advisory-2021-4213-03.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021072292
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159564/Ubuntu-Security-Notice-USN-4583-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2515
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163727/Red-Hat-Security-Advisory-2021-2992-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/PHP-buffer-overflow-via-mbfl-filt-conv-big5-wchar-32228
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160708/Gentoo-Linux-Security-Advisory-202012-16.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159722/Ubuntu-Security-Notice-USN-4583-2.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-impacted-by-vulnerabilities-in-php-cve-2020-7069-cve-2020-7059-2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3787
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-impacted-by-vulnerabilities-in-php-cve-2020-7069-cve-2020-7059/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3671/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021080321
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3581/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3541/
受影响实体
暂无
补丁
- PHP 缓冲区错误漏洞的修复措施<!--2020-5-11-->
还没有评论,来说两句吧...