← Back to CVEs
CVE-2019-11043
HIGHCISA KEV8.7
Description
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
CVE Details
CVSS v3.1 Score8.7
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published10/28/2019
Last Modified11/3/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorPHP
ProductFastCGI Process Manager (FPM)
Vulnerability NamePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
KEV Date Added2022-03-25
Remediation Due Date2022-04-15
Ransomware UseKnown
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc
Weaknesses (CWE)
CWE-120CWE-787
References
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(security@php.net)
http://seclists.org/fulldisclosure/2020/Jan/40(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3286(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3287(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3299(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3300(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3724(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3735(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3736(security@php.net)
https://access.redhat.com/errata/RHSA-2020:0322(security@php.net)
https://bugs.php.net/bug.php?id=78599(security@php.net)
https://github.com/neex/phuip-fpizdam(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(security@php.net)
https://seclists.org/bugtraq/2020/Jan/44(security@php.net)
https://security.netapp.com/advisory/ntap-20191031-0003/(security@php.net)
https://support.apple.com/kb/HT210919(security@php.net)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(security@php.net)
https://usn.ubuntu.com/4166-1/(security@php.net)
https://usn.ubuntu.com/4166-2/(security@php.net)
https://www.debian.org/security/2019/dsa-4552(security@php.net)
https://www.debian.org/security/2019/dsa-4553(security@php.net)
https://www.synology.com/security/advisory/Synology_SA_19_36(security@php.net)
https://www.tenable.com/security/tns-2021-14(security@php.net)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_19_36(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.