Description
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3555-1 | php7.3 security update |
Debian DSA |
DSA-5660-1 | php7.4 security update |
Debian DSA |
DSA-5661-1 | php8.2 security update |
Ubuntu USN |
USN-6305-1 | PHP vulnerabilities |
Ubuntu USN |
USN-6305-2 | PHP vulnerabilities |
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. |
Status: PUBLISHED
Assigner: php
Published:
Updated: 2025-02-13T17:01:48.673Z
Reserved: 2023-07-21T16:57:23.334Z
Link: CVE-2023-3824
No data.
Status : Modified
Published: 2023-08-11T06:15:10.560
Modified: 2025-02-13T17:16:59.457
Link: CVE-2023-3824
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN