3.3
CVSSv2

CVE-2020-7068

Published: 09/09/2020 Updated: 01/07/2022
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 3.6 | Impact Score: 2.5 | Exploitability Score: 1
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

debian debian linux 10.0

tenable tenable.sc

Vendor Advisories

Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in denial of service, information disclosure, cookie forgery or incorrect encryption For the stable distribution (buster), these problems have been fixed in version 7327-1~deb10u1 We recommend that you upgrade your php73 ...
The flaw is in phar_parse_zipfile() of ext/phar/zipc When processing a PHP archive file (phar), if a persistent entry is used as defined in phpini, then memory pointed to by the actual_alias pointer is freed Directly after the free, the actual_alias pointer is passed to zend_hash_str_add_ptr, where it is dereferenced Prior to the function call ...
Tenablesc leverages third-party software to help provide underlying functionality Multiple third-party components were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the potential impact of the ...