CVE-2020-7059

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

01 Jul 2022, 12:42

Type Values Removed Values Added
References
  • (CONFIRM) https://www.tenable.com/security/tns-2021-14 - Patch, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4279-1/ - (UBUNTU) https://usn.ubuntu.com/4279-1/ - Patch, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202003-57 - (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory
CPE cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

14 Jun 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html -

Information

Published : 2020-02-10 08:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-7059

Mitre link : CVE-2020-7059

CVE.ORG link : CVE-2020-7059


JSON object : View

Products Affected

debian

  • debian_linux

tenable

  • tenable.sc

php

  • php

opensuse

  • leap

oracle

  • communications_diameter_signaling_router
CWE
CWE-125

Out-of-bounds Read