Bug 1788258 (CVE-2019-11050) - CVE-2019-11050 php: Out of bounds read when parsing EXIF information
Summary: CVE-2019-11050 php: Out of bounds read when parsing EXIF information
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-11050
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1788259 1790938 1790939 1790940 1790941 1790942 1857705
Blocks: 1788265
TreeView+ depends on / blocked
 
Reported: 2020-01-06 20:26 UTC by Guilherme de Almeida Suckevicz
Modified: 2023-03-24 16:38 UTC (History)
6 users (show)

Fixed In Version: php 7.4.1, php 7.3.13, php 7.2.26
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-09-08 13:18:40 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3662 0 None None None 2020-09-08 09:46:47 UTC
Red Hat Product Errata RHSA-2020:5275 0 None None None 2020-12-01 12:03:00 UTC

Description Guilherme de Almeida Suckevicz 2020-01-06 20:26:28 UTC
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

Reference:
https://bugs.php.net/bug.php?id=78793

Comment 1 Guilherme de Almeida Suckevicz 2020-01-06 20:26:46 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1788259]

Comment 3 Marco Benatto 2020-01-14 15:12:37 UTC
Upstream commit for this issue: http://git.php.net/?p=php-src.git;a=commit;h=c14eb8de974fc8a4d74f3515424c293bc7a40fba

Comment 4 Marco Benatto 2020-01-14 15:18:15 UTC
There's an issue with EXIF module in PHP when exif tries to read maker notes from a given image metadata. When iterating on exif directories on exif_process_IFD_in_MAKERNOTE() starts to walk the buffer by the offset read but it doesn't decrement the remaining length of the buffer by the same proportion. An attack may leverage this issue by crafting an image with a malicious EXIF information, leading to Confidentiality impact and eventually DoS.

Both confidentiality and availability impact may be considered low. The attack has access just to a small amount of bytes from process heap and only a the single execution for this is affected.

Comment 6 errata-xmlrpc 2020-09-08 09:46:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3662 https://access.redhat.com/errata/RHSA-2020:3662

Comment 7 Product Security DevOps Team 2020-09-08 13:18:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11050

Comment 8 errata-xmlrpc 2020-12-01 12:02:57 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS

Via RHSA-2020:5275 https://access.redhat.com/errata/RHSA-2020:5275


Note You need to log in before you can comment on or make changes to this bug.