CVE-2019-11043

Scores

EPSS

0.941high94.1%
0%20%40%60%80%100%

Percentile: 94.1%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-120CWE-20CWE-787

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-11043

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 47553

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47553

Exploit ID: 48182

Source: exploitdb

URL: https://www.exploit-db.com/exploits/48182

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2020:0322

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3736

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3735

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3724

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3300

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3287

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:3286

Vulnerable Software (56)

Type: Configuration

Product: php

Operating System: rhel 6

Trait:
{  "fixed": "5.3.3-50.el6_10"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel 7

Trait:
{  "fixed": "5.4.16-46.1.el7_7"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel 7.6

Trait:
{  "fixed": "5.4.16-46.1.el7_6"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel

Trait:
{  "fixed": "7.2-8010020191030112723.dcfb48bd"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel

Trait:
{  "fixed": "7.3-8010020191030161321.dcfb48bd"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel

Trait:
{  "fixed": "7.2-8000020191113103901.5d58a046"}

Source: redhat

Type: Configuration

Product: php5

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: php5

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: php7

Operating System: altlinux

Trait:
{  "fixed": "0:7.3.11-alt1"}

Source: redhat

Type: Configuration

Product: php7-devel

Operating System: altlinux

Trait:
{  "fixed": "0:7.3.11-alt1"}

Source: redhat

Type: Configuration

Product: php7-libs

Operating System: altlinux

Trait:
{  "fixed": "0:7.3.11-alt1"}

Source: redhat

Type: Configuration

Product: php7-mysqlnd

Operating System: altlinux

Trait:
{  "fixed": "0:7.3.11-alt1"}

Source: redhat

Type: Configuration

Product: php7.0

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "7.0.33-0ubuntu0.16.04.7"}

Source: ubuntu

Type: Configuration

Product: php7.0

Operating System: astra 1.6.5

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: php7.0

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: php7.2

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "7.2.24-0ubuntu0.18.04.1"}

Source: ubuntu

Type: Configuration

Product: php7.2

Operating System: ubuntu disco 19.04

Trait:
{  "fixed": "7.2.24-0ubuntu0.19.04.1"}

Source: ubuntu

Type: Configuration

Product: php7.3

Operating System: ubuntu eoan 19.10

Trait:
{  "fixed": "7.3.11-0ubuntu0.19.10.1"}

Source: ubuntu

Type: Configuration

Product: php7.3

Operating System: debian

Trait:
{  "fixed": "7.3.11-1~deb10u1"}

Source: debian

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-2.el7"}

Source: redhat