← Zuruck zu CVEs
CVE-2019-11043
HIGHCISA KEV8.7
Beschreibung
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
CVE Details
CVSS v3.1 Bewertung8.7
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/28/2019
Zuletzt geandert11/3/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerPHP
ProduktFastCGI Process Manager (FPM)
SchwachstellennamePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
KEV Aufnahmedatum2022-03-25
Behebungsfrist2022-04-15
Ransomware-NutzungKnown
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc
Schwachen (CWE)
CWE-120CWE-787
Referenzen
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(security@php.net)
http://seclists.org/fulldisclosure/2020/Jan/40(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3286(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3287(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3299(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3300(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3724(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3735(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3736(security@php.net)
https://access.redhat.com/errata/RHSA-2020:0322(security@php.net)
https://bugs.php.net/bug.php?id=78599(security@php.net)
https://github.com/neex/phuip-fpizdam(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(security@php.net)
https://seclists.org/bugtraq/2020/Jan/44(security@php.net)
https://security.netapp.com/advisory/ntap-20191031-0003/(security@php.net)
https://support.apple.com/kb/HT210919(security@php.net)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(security@php.net)
https://usn.ubuntu.com/4166-1/(security@php.net)
https://usn.ubuntu.com/4166-2/(security@php.net)
https://www.debian.org/security/2019/dsa-4552(security@php.net)
https://www.debian.org/security/2019/dsa-4553(security@php.net)
https://www.synology.com/security/advisory/Synology_SA_19_36(security@php.net)
https://www.tenable.com/security/tns-2021-14(security@php.net)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_19_36(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.