Date(s) Issues: 05/18/2020
Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. Successfully exploiting the most severe of these vulnerabilities could allow an attacker to crash the PHP process. This could allow for a denial-of-service condition once the process stops running.
Systems Affected
- PHP 7.2 Prior to Version 7.2.3
- PHP 7.2.4 Prior to Version 7.3.17
- PHP 7.3.2 Prior to Version 7.4.5
Risk
GOVERNMENT
- Large and medium government entities: HIGH
- Small government entities: HIGH
BUSINESSES
- Large and medium business entities: HIGH
- Small business entities: HIGH
Technical Summary
Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition. Details of these vulnerabilities are as below:
Version 7.2.30
- Bug #79468 (SIGSEGV when closing stream handle with a stream filter appended).
- Bug #79330 (shell_exec() silently truncates after a null byte).
- Bug #79465 (OOB Read in urldecode()).
Version 7.3.17
- Bug #79364 (When copy empty array, next key is unspecified).
- Bug #78210 (Invalid pointer address).
- Bug #79199 (curl_copy_handle() memory leak).
- Bug #79396 (DateTime hour incorrect during DST jump forward).
- Bug #79200 (Some iconv functions cut Windows-1258).
- Bug #79412 (Opcache chokes and uses 100% CPU on specific script).
- Bug #79413 (session_create_id() fails for active sessions).
- Bug #79427 (Integer Overflow in shmop_open()).
- Bug #61597 (SXE properties may lack attributes and content).
- Bug #75673 (SplStack::unserialize() behavior).
- Bug #79393 (Null coalescing operator failing with SplFixedArray).
- Bug #79330 (shell_exec() silently truncates after a null byte).
- Bug #79465 (OOB Read in urldecode()). (CVE-2020-7067)
- Bug #79410 (system() swallows last chunk if it is exactly 4095 bytes without newline).
- Bug #79296 (ZipArchive::open fails on empty file).
- Bug #79424 (php_zip_glob uses gl_pathc after call to globfree).