When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
01 Jul 2022, 12:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
|
References |
|
|
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4279-1/ - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory |
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-02-10 08:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-7060
Mitre link : CVE-2020-7060
CVE.ORG link : CVE-2020-7060
JSON object : View
Products Affected
debian
- debian_linux
tenable
- tenable.sc
php
- php
opensuse
- leap
oracle
- communications_diameter_signaling_router
CWE
CWE-125
Out-of-bounds Read