Vulnerability Details : CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
Products affected by CVE-2019-9020
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
Threat overview for CVE-2019-9020
Top countries where our scanners detected CVE-2019-9020
Top open port discovered on systems with this issue
80
IPs affected by CVE-2019-9020 826,981
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-9020!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-9020
0.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9020
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-9020
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9020
-
https://access.redhat.com/errata/RHSA-2019:3299
RHSA-2019:3299 - Security Advisory - Red Hat Customer Portal
-
https://bugs.php.net/bug.php?id=77242
PHP :: Sec Bug #77242 :: heap out of bounds read in xmlrpc_decode()Exploit;Issue Tracking;Patch;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
[security-announce] openSUSE-SU-2019:1293-1: moderate: Security update fMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
[security-announce] openSUSE-SU-2019:1572-1: moderate: Security update f
-
https://access.redhat.com/errata/RHSA-2019:2519
RHSA-2019:2519 - Security Advisory - Red Hat Customer Portal
-
https://security.netapp.com/advisory/ntap-20190321-0001/
February 2019 PHP Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://bugs.php.net/bug.php?id=77249
PHP :: Sec Bug #77249 :: Use after free in xmlrpc_decode()Issue Tracking;Exploit;Vendor Advisory
-
https://usn.ubuntu.com/3902-2/
USN-3902-2: PHP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
[security-announce] openSUSE-SU-2019:1573-1: moderate: Security update f
-
http://www.securityfocus.com/bid/107156
PHP Information Disclosure and Heap Buffer Overflow VulnerabilitiesThird Party Advisory;VDB Entry
-
https://usn.ubuntu.com/3902-1/
USN-3902-1: PHP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.debian.org/security/2019/dsa-4398
Debian -- Security Information -- DSA-4398-1 php7.0Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
[security-announce] openSUSE-SU-2019:1256-1: moderate: Security update fThird Party Advisory
Jump to