Vulnerability Name: | CVE-2018-10549 (CCN-142564) | ||||||||||||||||||||||||||||
Assigned: | 2018-04-26 | ||||||||||||||||||||||||||||
Published: | 2018-04-26 | ||||||||||||||||||||||||||||
Updated: | 2019-08-19 | ||||||||||||||||||||||||||||
Summary: | An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-10549 Source: CCN Type: PHP Web site PHP 5 ChangeLog Source: CONFIRM Type: Patch, Vendor Advisory http://php.net/ChangeLog-5.php Source: CCN Type: PHP Web site PHP 7 ChangeLog Source: CONFIRM Type: Patch, Vendor Advisory http://php.net/ChangeLog-7.php Source: BID Type: Third Party Advisory, VDB Entry 104019 Source: CCN Type: BID-104019 PHP Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040807 Source: REDHAT Type: UNKNOWN RHSA-2019:2519 Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://bugs.php.net/bug.php?id=76130 Source: XF Type: UNKNOWN php-cve201810549-code-exec(142564) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update Source: GENTOO Type: Third Party Advisory GLSA-201812-01 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20180607-0003/ Source: UBUNTU Type: Third Party Advisory USN-3646-1 Source: DEBIAN Type: Third Party Advisory DSA-4240 Source: CCN Type: IBM Security Bulletin 0713449 (API Connect) API Connect Developer Portal is affected by multiple PHP vulnerabilities Source: CONFIRM Type: Third Party Advisory https://www.synology.com/support/security/Synology_SA_18_20 Source: CONFIRM Type: Third Party Advisory https://www.tenable.com/security/tns-2018-12 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-10549 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |