CVE-2019-9022
22.02.2019, 23:29
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 7.0.0 ≤ 𝑥 < 7.1.26 |
php | php | 7.2.0 ≤ 𝑥 < 7.2.14 |
php | php | 7.3.0 ≤ 𝑥 < 7.3.2 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
netapp | storage_automation_store | - |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
php5 |
| ||||||||||
php7.0 |
| ||||||||||
php7.2 |
| ||||||||||
php7.3 |
|
Common Weakness Enumeration
References