CVE-2023-3824

In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. 
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Aug 2023, 16:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
CWE CWE-119
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Third Party Advisory
References (MISC) https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - (MISC) https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - Exploit, Third Party Advisory

12 Aug 2023, 06:19

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ -

11 Aug 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-11 06:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-3824

Mitre link : CVE-2023-3824

CVE.ORG link : CVE-2023-3824


JSON object : View

Products Affected

fedoraproject

  • fedora

debian

  • debian_linux

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer