Description
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
Published: 2019-10-28
Score: 8.7 High
EPSS: 94.1% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Configuring nginx (or other server that implements the front-end part of the FPM protocol) to check for the existence of the target file before passing it to PHP FPM (e.g. "try_files $uri =404" or "if (-f $uri)" in nginx) for would prevent this vulnerability from happening.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1970-1 php5 security update
Debian DSA Debian DSA DSA-4552-1 php7.0 security update
Debian DSA Debian DSA DSA-4553-1 php7.3 security update
Ubuntu USN Ubuntu USN USN-4166-1 PHP vulnerability
Ubuntu USN Ubuntu USN USN-4166-2 PHP vulnerability
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html cve-icon cve-icon
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2020/Jan/40 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3286 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3287 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3299 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3300 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3724 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3735 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3736 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0322 cve-icon cve-icon
https://bugs.php.net/bug.php?id=78599 cve-icon cve-icon
https://github.com/neex/phuip-fpizdam cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-11043 cve-icon
https://seclists.org/bugtraq/2020/Jan/44 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20191031-0003/ cve-icon cve-icon
https://support.apple.com/kb/HT210919 cve-icon cve-icon
https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/4166-1/ cve-icon cve-icon
https://usn.ubuntu.com/4166-2/ cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-11043 cve-icon
https://www.debian.org/security/2019/dsa-4552 cve-icon cve-icon
https://www.debian.org/security/2019/dsa-4553 cve-icon cve-icon
https://www.nginx.com/blog/php-fpm-cve-2019-11043-vulnerability-nginx/ cve-icon
https://www.synology.com/security/advisory/Synology_SA_19_36 cve-icon cve-icon
https://www.tenable.com/security/tns-2021-14 cve-icon cve-icon
History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 07 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-03-25'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Php Php
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Eus Compute Node Enterprise Linux For Arm 64 Enterprise Linux For Arm 64 Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Big Endian Enterprise Linux For Power Big Endian Eus Enterprise Linux For Power Little Endian Enterprise Linux For Power Little Endian Eus Enterprise Linux For Scientific Computing Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Workstation Rhel E4s Rhel Eus Rhel Software Collections Software Collections
Tenable Tenable.sc
cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published:

Updated: 2025-10-21T23:45:28.408Z

Reserved: 2019-04-09T00:00:00.000Z

Link: CVE-2019-11043

cve-icon Vulnrichment

Updated: 2024-08-04T22:40:16.064Z

cve-icon NVD

Status : Analyzed

Published: 2019-10-28T15:15:13.863

Modified: 2025-11-03T19:23:46.417

Link: CVE-2019-11043

cve-icon Redhat

Severity : Critical

Publid Date: 2019-10-24T00:00:00Z

Links: CVE-2019-11043 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses