Description
In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3243-1 | php7.3 security update |
Debian DSA |
DSA-5179-1 | php7.4 security update |
EUVD |
EUVD-2022-53078 | In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability. |
Ubuntu USN |
USN-5479-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5479-2 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-17T03:38:54.950Z
Reserved: 2022-05-25T00:00:00.000Z
Link: CVE-2022-31626
No data.
Status : Modified
Published: 2022-06-16T06:15:08.807
Modified: 2024-11-21T07:04:53.017
Link: CVE-2022-31626
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN