TROYANOSYVIRUS
Retour aux CVEs

CVE-2019-11043

HIGHCISA KEV
8.7

Description

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Details CVE

Score CVSS v3.18.7
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie10/28/2019
Derniere modification11/3/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurPHP
ProduitFastCGI Process Manager (FPM)
Nom vulnerabilitePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
Date ajout KEV2022-03-25
Date limite remediation2022-04-15
Utilise dans ransomwareKnown

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc

Faiblesses (CWE)

CWE-120CWE-787

References

http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.