In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
References
Link | Resource |
---|---|
https://bugs.php.net/bug.php?id=81746 | Exploit Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230517-0001/ | |
https://bugs.php.net/bug.php?id=81746 | Exploit Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230517-0001/ |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://bugs.php.net/bug.php?id=81746 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230517-0001/ - |
Information
Published : 2023-02-16 07:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0568
Mitre link : CVE-2023-0568
CVE.ORG link : CVE-2023-0568
JSON object : View
Products Affected
php
- php