Bug 1786570 (CVE-2019-11047)

Summary: CVE-2019-11047 php: Information disclosure in exif_read_data()
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fedora, hhorak, jorton, rcollet, webstack-team, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: php 7.2Git-2019-12-04 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-08 13:18:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1786571, 1788221, 1788222, 1788223, 1788224, 1788225, 1857703    
Bug Blocks: 1786580    

Description Dhananjay Arunesh 2019-12-26 09:47:42 UTC
A vulnerability was found in PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

Reference:
https://bugs.php.net/bug.php?id=78910

Comment 1 Dhananjay Arunesh 2019-12-26 09:48:59 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1786571]

Comment 3 Marco Benatto 2020-01-06 18:01:19 UTC
Upstream commit for this bug:
http://git.php.net/?p=php-src.git;a=commit;h=d348cfb96f2543565691010ade5e0346338be5a7

Comment 4 Marco Benatto 2020-01-06 18:14:39 UTC
There's an issue with PHP's EXIF module during a EXIF tag processing. When processing the Maker Note tag exif module fails to validate the data lenght, triggering an out of bounds read on a heap allocated value.
The out of bounds happens when exif_process_IFD_in_MAKERNOTE() function calls strncmp() to compare the Maker Note's id string. An attacker may leverage this by crafting a speciall EXIF section, leading to information disclousure and possible DoS.

This flaw has Low impact regarding Confidentiality as the attack has no control over the information which may be leaked and only a small chunck of heap data will be exposed.

Comment 12 errata-xmlrpc 2020-09-08 09:46:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3662 https://access.redhat.com/errata/RHSA-2020:3662

Comment 13 Product Security DevOps Team 2020-09-08 13:18:31 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11047

Comment 14 errata-xmlrpc 2020-12-01 12:03:15 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS

Via RHSA-2020:5275 https://access.redhat.com/errata/RHSA-2020:5275