CVE-2019-11043

CVE Published 2019-10-28
Related CWE(s) CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), CWE-787: Out-of-bounds Write
Related Vendor(s) fedoraproject, redhat, php, canonical, tenable, debian
Related Product(s) enterprise_linux_for_arm_64, fedora, enterprise_linux_for_scientific_computing, enterprise_linux, tenable.sc, enterprise_linux_for_power_big_endian_eus, enterprise_linux_for_arm_64_eus, enterprise_linux_desktop, php, software_collections, enterprise_linux_workstation, enterprise_linux_for_power_big_endian, enterprise_linux_eus, enterprise_linux_for_power_little_endian_eus, debian_linux, ubuntu_linux, enterprise_linux_eus_compute_node, enterprise_linux_server_aus, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_power_little_endian, enterprise_linux_server, enterprise_linux_for_ibm_z_systems_eus, enterprise_linux_server_tus
Exploitation Reported (CISA KEV) 2022-03-25
CVSS 3 Base Score 8.7 (HIGH)
CVSS 3 Attack Complexity HIGH
CVSS 3 Attack Vector NETWORK

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Associated CAPEC Patterns

References