An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3922-2 | PHP vulnerabilities |
Ubuntu USN |
USN-3922-3 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T21:54:45.246Z
Reserved: 2019-03-11T00:00:00
Link: CVE-2019-9675
No data.
Status : Modified
Published: 2019-03-11T11:29:12.080
Modified: 2024-11-21T04:52:05.553
Link: CVE-2019-9675
OpenCVE Enrichment
No data.
Ubuntu USN