A vulnerability was found in PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. Reference: https://bugs.php.net/bug.php?id=78910
Created php tracking bugs for this issue: Affects: fedora-all [bug 1786571]
Upstream commit for this bug: http://git.php.net/?p=php-src.git;a=commit;h=d348cfb96f2543565691010ade5e0346338be5a7
There's an issue with PHP's EXIF module during a EXIF tag processing. When processing the Maker Note tag exif module fails to validate the data lenght, triggering an out of bounds read on a heap allocated value. The out of bounds happens when exif_process_IFD_in_MAKERNOTE() function calls strncmp() to compare the Maker Note's id string. An attacker may leverage this by crafting a speciall EXIF section, leading to information disclousure and possible DoS. This flaw has Low impact regarding Confidentiality as the attack has no control over the information which may be leaked and only a small chunck of heap data will be exposed.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:3662 https://access.redhat.com/errata/RHSA-2020:3662
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11047
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5275 https://access.redhat.com/errata/RHSA-2020:5275