A vulnerability was found in PHP up to 5.6.39/7.1.25/7.2.13/7.3.0 (Programming Language Software). It has been declared as critical. This vulnerability affects the function phar_detect_phar_fname_ext
of the file ext/phar/phar.c of the component phar. The manipulation with an unknown input leads to a memory corruption vulnerability (Heap-based). The CWE definition for the vulnerability is CWE-122. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was published 02/22/2019. This vulnerability was named CVE-2019-9021 since 02/22/2019. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 02/23/2019).
Upgrading to version 5.6.40, 7.1.26, 7.2.14 or 7.3.1 eliminates this vulnerability.
Similar entries are available at 131109, 131111, 131112 and 131113.
CPE
CVSSv3
VulDB Meta Base Score: 7.3
VulDB Meta Temp Score: 7.0
VulDB Base Score:
7.3VulDB Temp Score:
7.0VulDB Vector:
🔒VulDB Reliability:
🔍CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍Exploiting
Class: Memory corruption / Heap-based (
CWE-122)
Local: No
Remote: Yes
Availability:
🔒Status: Not defined
Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Actions:
🔍Countermeasures
Recommended: Upgrade
Status:
🔍0-Day Time:
🔒Upgrade: PHP 5.6.40/7.1.26/7.2.14/7.3.1
Timeline
02/22/2019 Advisory disclosed
02/22/2019 CVE assigned02/23/2019 VulDB entry created02/23/2019 VulDB last updateSources
CVE:
CVE-2019-9021 (
🔒)
See also:
🔒Entry
Created: 02/23/2019
Complete:
🔍Lien vers l'article source