← Zuruck zu CVEs
CVE-2019-9641
CRITICAL9.8
Beschreibung
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/9/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxnetapp:storage_automation_storeopensuse:leapphp:php
Schwachen (CWE)
CWE-908
Referenzen
https://bugs.php.net/bug.php?id=77509(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20190502-0007/(cve@mitre.org)
https://usn.ubuntu.com/3922-1/(cve@mitre.org)
https://usn.ubuntu.com/3922-2/(cve@mitre.org)
https://usn.ubuntu.com/3922-3/(cve@mitre.org)
https://www.debian.org/security/2019/dsa-4403(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=77509(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190502-0007/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3922-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3922-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3922-3/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4403(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.