When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
01 Jul 2022, 12:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4279-1/ - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory | |
CPE | cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-02-10 08:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-7059
Mitre link : CVE-2020-7059
CVE.ORG link : CVE-2020-7059
JSON object : View
Products Affected
debian
- debian_linux
tenable
- tenable.sc
php
- php
opensuse
- leap
oracle
- communications_diameter_signaling_router
CWE
CWE-125
Out-of-bounds Read