Integer Overflow to Buffer Overflow Affecting php-common package, versions <0:8.1.14-1.module+el9.2.0+17911+b059dfc2


Severity

medium

    Threat Intelligence

    EPSS
    2.47% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS9-PHPCOMMON-3105040
  • published 5 Nov 2022
  • disclosed 20 Oct 2022

How to fix?

Upgrade Centos:9 php-common to version 0:8.1.14-1.module+el9.2.0+17911+b059dfc2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-common package and not the php-common package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

CVSS Scores

version 3.1
Expand this section

Snyk

8.1 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

9.8 critical
Expand this section

SUSE

8.1 high
Expand this section

Red Hat

8.1 high