CVE-2023-3824

In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. 
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

27 Oct 2023, 18:58

Type Values Removed Values Added
References (MISC) https://security.netapp.com/advisory/ntap-20230825-0001/ - (MISC) https://security.netapp.com/advisory/ntap-20230825-0001/ - Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Third Party Advisory (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Mailing List
References (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html - Mailing List
First Time Fedoraproject
Fedoraproject fedora
Debian debian Linux
Debian
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

05 Sep 2023, 23:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html -

25 Aug 2023, 23:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20230825-0001/ -

21 Aug 2023, 16:31

Type Values Removed Values Added
First Time Php
Php php
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-119
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
References (MISC) https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - (MISC) https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - Exploit, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Third Party Advisory

12 Aug 2023, 06:19

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ -

11 Aug 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-11 06:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-3824

Mitre link : CVE-2023-3824

CVE.ORG link : CVE-2023-3824


JSON object : View

Products Affected

debian

  • debian_linux

php

  • php

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer