9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
77.6%
Issue Overview:
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.(CVE-2018-14851)
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.(CVE-2018-12882)
An issue was discovered in PHP 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.(CVE-2018-14883)
Affected Packages:
php72
Issue Correction:
Run yum update php72 to update your system.
New Packages:
i686:
php72-xml-7.2.8-1.5.amzn1.i686
php72-pdo-dblib-7.2.8-1.5.amzn1.i686
php72-imap-7.2.8-1.5.amzn1.i686
php72-bcmath-7.2.8-1.5.amzn1.i686
php72-pspell-7.2.8-1.5.amzn1.i686
php72-opcache-7.2.8-1.5.amzn1.i686
php72-gd-7.2.8-1.5.amzn1.i686
php72-embedded-7.2.8-1.5.amzn1.i686
php72-snmp-7.2.8-1.5.amzn1.i686
php72-dba-7.2.8-1.5.amzn1.i686
php72-mbstring-7.2.8-1.5.amzn1.i686
php72-ldap-7.2.8-1.5.amzn1.i686
php72-mysqlnd-7.2.8-1.5.amzn1.i686
php72-json-7.2.8-1.5.amzn1.i686
php72-pgsql-7.2.8-1.5.amzn1.i686
php72-intl-7.2.8-1.5.amzn1.i686
php72-common-7.2.8-1.5.amzn1.i686
php72-odbc-7.2.8-1.5.amzn1.i686
php72-recode-7.2.8-1.5.amzn1.i686
php72-debuginfo-7.2.8-1.5.amzn1.i686
php72-fpm-7.2.8-1.5.amzn1.i686
php72-gmp-7.2.8-1.5.amzn1.i686
php72-7.2.8-1.5.amzn1.i686
php72-dbg-7.2.8-1.5.amzn1.i686
php72-process-7.2.8-1.5.amzn1.i686
php72-devel-7.2.8-1.5.amzn1.i686
php72-xmlrpc-7.2.8-1.5.amzn1.i686
php72-cli-7.2.8-1.5.amzn1.i686
php72-enchant-7.2.8-1.5.amzn1.i686
php72-pdo-7.2.8-1.5.amzn1.i686
php72-tidy-7.2.8-1.5.amzn1.i686
php72-soap-7.2.8-1.5.amzn1.i686
src:
php72-7.2.8-1.5.amzn1.src
x86_64:
php72-pspell-7.2.8-1.5.amzn1.x86_64
php72-json-7.2.8-1.5.amzn1.x86_64
php72-enchant-7.2.8-1.5.amzn1.x86_64
php72-pgsql-7.2.8-1.5.amzn1.x86_64
php72-common-7.2.8-1.5.amzn1.x86_64
php72-bcmath-7.2.8-1.5.amzn1.x86_64
php72-snmp-7.2.8-1.5.amzn1.x86_64
php72-odbc-7.2.8-1.5.amzn1.x86_64
php72-dbg-7.2.8-1.5.amzn1.x86_64
php72-intl-7.2.8-1.5.amzn1.x86_64
php72-gd-7.2.8-1.5.amzn1.x86_64
php72-cli-7.2.8-1.5.amzn1.x86_64
php72-embedded-7.2.8-1.5.amzn1.x86_64
php72-imap-7.2.8-1.5.amzn1.x86_64
php72-xmlrpc-7.2.8-1.5.amzn1.x86_64
php72-opcache-7.2.8-1.5.amzn1.x86_64
php72-7.2.8-1.5.amzn1.x86_64
php72-xml-7.2.8-1.5.amzn1.x86_64
php72-tidy-7.2.8-1.5.amzn1.x86_64
php72-mbstring-7.2.8-1.5.amzn1.x86_64
php72-pdo-7.2.8-1.5.amzn1.x86_64
php72-devel-7.2.8-1.5.amzn1.x86_64
php72-dba-7.2.8-1.5.amzn1.x86_64
php72-process-7.2.8-1.5.amzn1.x86_64
php72-debuginfo-7.2.8-1.5.amzn1.x86_64
php72-mysqlnd-7.2.8-1.5.amzn1.x86_64
php72-ldap-7.2.8-1.5.amzn1.x86_64
php72-gmp-7.2.8-1.5.amzn1.x86_64
php72-recode-7.2.8-1.5.amzn1.x86_64
php72-soap-7.2.8-1.5.amzn1.x86_64
php72-pdo-dblib-7.2.8-1.5.amzn1.x86_64
php72-fpm-7.2.8-1.5.amzn1.x86_64
Red Hat: CVE-2018-12882, CVE-2018-14851, CVE-2018-14883
Mitre: CVE-2018-12882, CVE-2018-14851, CVE-2018-14883
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | php72-xml | < 7.2.8-1.5.amzn1 | php72-xml-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-pdo-dblib | < 7.2.8-1.5.amzn1 | php72-pdo-dblib-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-imap | < 7.2.8-1.5.amzn1 | php72-imap-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-bcmath | < 7.2.8-1.5.amzn1 | php72-bcmath-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-pspell | < 7.2.8-1.5.amzn1 | php72-pspell-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-opcache | < 7.2.8-1.5.amzn1 | php72-opcache-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-gd | < 7.2.8-1.5.amzn1 | php72-gd-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-embedded | < 7.2.8-1.5.amzn1 | php72-embedded-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-snmp | < 7.2.8-1.5.amzn1 | php72-snmp-7.2.8-1.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | php72-dba | < 7.2.8-1.5.amzn1 | php72-dba-7.2.8-1.5.amzn1.i686.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
77.6%