← Voltar para CVEs
CVE-2019-11043
HIGHCISA KEV8.7
Descricao
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
Detalhes CVE
Pontuacao CVSS v3.18.7
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/28/2019
Ultima modificacao11/3/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorPHP
ProdutoFastCGI Process Manager (FPM)
Nome da vulnerabilidadePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
Data inclusao KEV2022-03-25
Prazo de remediacao2022-04-15
Uso em ransomwareKnown
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc
Fraquezas (CWE)
CWE-120CWE-787
Referencias
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(security@php.net)
http://seclists.org/fulldisclosure/2020/Jan/40(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3286(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3287(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3299(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3300(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3724(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3735(security@php.net)
https://access.redhat.com/errata/RHSA-2019:3736(security@php.net)
https://access.redhat.com/errata/RHSA-2020:0322(security@php.net)
https://bugs.php.net/bug.php?id=78599(security@php.net)
https://github.com/neex/phuip-fpizdam(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(security@php.net)
https://seclists.org/bugtraq/2020/Jan/44(security@php.net)
https://security.netapp.com/advisory/ntap-20191031-0003/(security@php.net)
https://support.apple.com/kb/HT210919(security@php.net)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(security@php.net)
https://usn.ubuntu.com/4166-1/(security@php.net)
https://usn.ubuntu.com/4166-2/(security@php.net)
https://www.debian.org/security/2019/dsa-4552(security@php.net)
https://www.debian.org/security/2019/dsa-4553(security@php.net)
https://www.synology.com/security/advisory/Synology_SA_19_36(security@php.net)
https://www.tenable.com/security/tns-2021-14(security@php.net)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_19_36(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.