← Retour aux CVEs
CVE-2019-11043
HIGHCISA KEV8.7
Description
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
Details CVE
Score CVSS v3.18.7
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie10/28/2019
Derniere modification11/3/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurPHP
ProduitFastCGI Process Manager (FPM)
Nom vulnerabilitePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
Date ajout KEV2022-03-25
Date limite remediation2022-04-15
Utilise dans ransomwareKnown
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc
Faiblesses (CWE)
CWE-120CWE-787
References
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(security@php.net)
http://seclists.org/fulldisclosure/2020/Jan/40(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3286(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3287(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3299(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3300(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3724(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3735(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3736(security@php.net)
https://access.redhat.com/errata/RHSA-2020:0322(security@php.net)
https://bugs.php.net/bug.php?id=78599(security@php.net)
https://github.com/neex/phuip-fpizdam(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(security@php.net)
https://seclists.org/bugtraq/2020/Jan/44(security@php.net)
https://security.netapp.com/advisory/ntap-20191031-0003/(security@php.net)
https://support.apple.com/kb/HT210919(security@php.net)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(security@php.net)
https://usn.ubuntu.com/4166-1/(security@php.net)
https://usn.ubuntu.com/4166-2/(security@php.net)
https://www.debian.org/security/2019/dsa-4552(security@php.net)
https://www.debian.org/security/2019/dsa-4553(security@php.net)
https://www.synology.com/security/advisory/Synology_SA_19_36(security@php.net)
https://www.tenable.com/security/tns-2021-14(security@php.net)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_19_36(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.