CVE-2020-7060

When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

01 Jul 2022, 12:33

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References
  • (CONFIRM) https://www.tenable.com/security/tns-2021-14 - Patch, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4279-1/ - (UBUNTU) https://usn.ubuntu.com/4279-1/ - Patch, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202003-57 - (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory

14 Jun 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html -

Information

Published : 2020-02-10 08:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-7060

Mitre link : CVE-2020-7060

CVE.ORG link : CVE-2020-7060


JSON object : View

Products Affected

debian

  • debian_linux

tenable

  • tenable.sc

php

  • php

opensuse

  • leap

oracle

  • communications_diameter_signaling_router
CWE
CWE-125

Out-of-bounds Read