CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
81.6%
In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
[
{
"vendor": "PHP Group",
"product": "PHP",
"versions": [
{
"version": "7.4.X",
"status": "affected",
"lessThan": "7.4.30",
"versionType": "custom"
},
{
"version": "8.0.X",
"status": "affected",
"lessThan": "8.0.20",
"versionType": "custom"
},
{
"version": "8.1.X",
"status": "affected",
"lessThan": "8.1.7",
"versionType": "custom"
}
]
}
]
bugs.php.net/bug.php?id=81719
lists.debian.org/debian-lts-announce/2022/12/msg00030.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T4MMEEZYYAEHPQMZDFN44PHORJWJFZQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZTZQKRGEYJT5UB4FGG3MOE72SQUHSL4/
security.gentoo.org/glsa/202209-20
security.netapp.com/advisory/ntap-20220722-0005/
www.debian.org/security/2022/dsa-5179
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
81.6%