CVE-2019-9675

high

Description

An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.

References

https://usn.ubuntu.com/3922-3/

https://usn.ubuntu.com/3922-2/

https://bugs.php.net/bug.php?id=77586

http://php.net/ChangeLog-7.php

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html

Details

Source: Mitre, NVD

Published: 2019-03-11

Updated: 2024-08-04

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High