When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
01 Jul 2022, 12:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenable tenable.sc
Tenable Opensuse leap Debian Opensuse Debian debian Linux Oracle Oracle communications Diameter Signaling Router |
|
CPE | cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* |
|
References |
|
|
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4279-1/ - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20200221-0002/ - Third Party Advisory |
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jan 2021, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-02-10 08:15
Updated : 2023-12-10 13:13
NVD link : CVE-2020-7059
Mitre link : CVE-2020-7059
CVE.ORG link : CVE-2020-7059
JSON object : View
Products Affected
tenable
- tenable.sc
php
- php
oracle
- communications_diameter_signaling_router
opensuse
- leap
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read