Vulnerability Details : CVE-2019-11042
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2019-11042
Probability of exploitation activity in the next 30 days: 0.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 55 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-11042
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:P |
8.6
|
4.9
|
[email protected] |
4.8
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L |
2.2
|
2.5
|
[email protected] |
7.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H |
2.8
|
4.2
|
[email protected] |
CWE ids for CVE-2019-11042
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- [email protected] (Primary)
- [email protected] (Secondary)
References for CVE-2019-11042
-
https://www.tenable.com/security/tns-2021-14
Third Party Advisory
-
https://bugs.php.net/bug.php?id=78256
Exploit;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html
Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3299
Third Party Advisory
-
https://seclists.org/bugtraq/2019/Sep/38
Mailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Oct/15
Mailing List;Third Party Advisory
-
https://usn.ubuntu.com/4097-2/
Third Party Advisory
-
https://www.debian.org/security/2019/dsa-4529
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html
Third Party Advisory
-
https://seclists.org/bugtraq/2019/Sep/35
Mailing List;Third Party Advisory
-
https://www.debian.org/security/2019/dsa-4527
Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20190822-0003/
Third Party Advisory
-
https://support.apple.com/kb/HT210634
Third Party Advisory
-
https://support.apple.com/kb/HT210722
Third Party Advisory
-
https://seclists.org/bugtraq/2019/Oct/9
Mailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Oct/55
Mailing List;Third Party Advisory
-
https://usn.ubuntu.com/4097-1/
Third Party Advisory
Products affected by CVE-2019-11042
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*