An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1741-1 | php5 security update |
Debian DSA |
DSA-4398-1 | php7.0 security update |
EUVD |
EUVD-2019-18409 | An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries. |
Ubuntu USN |
USN-3902-1 | PHP vulnerabilities |
Ubuntu USN |
USN-3922-2 | PHP vulnerabilities |
Ubuntu USN |
USN-3922-3 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T21:31:37.646Z
Reserved: 2019-02-22T00:00:00
Link: CVE-2019-9022
No data.
Status : Modified
Published: 2019-02-22T23:29:00.440
Modified: 2024-11-21T04:50:49.827
Link: CVE-2019-9022
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN