TROYANOSYVIRUS
Voltar para CVEs

CVE-2019-11043

HIGHCISA KEV
8.7

Descricao

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Detalhes CVE

Pontuacao CVSS v3.18.7
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/28/2019
Ultima modificacao11/3/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorPHP
ProdutoFastCGI Process Manager (FPM)
Nome da vulnerabilidadePHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
Data inclusao KEV2022-03-25
Prazo de remediacao2022-04-15
Uso em ransomwareKnown

Produtos afetados

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraphp:phpredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:software_collectionstenable:tenable.sc

Fraquezas (CWE)

CWE-120CWE-787

Referencias

http://seclists.org/fulldisclosure/2020/Jan/40(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3286(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3287(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3299(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3300(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3735(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3736(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0322(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=78599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/neex/phuip-fpizdam(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210919(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4166-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4552(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4553(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2021-14(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.