CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
79.3%
Package : php7.3
Version : 7.3.31-1~deb10u6
CVE ID : CVE-2024-2756 CVE-2024-3096
Security issues were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure
or incorrect validation of password hashes.
CVE-2024-2756
Marco Squarcina discovered that network and same-site attackers can
set a standard insecure cookie in the victim's browser which is
treated as a `__Host-` or `__Secure-` cookie by PHP applications.
This issue stems from an incomplete fix to CVE-2022-31629.
CVE-2024-3096
Eric Stern discovered that if a password stored with password_hash()
starts with a null byte (\x00), testing a blank string as the
password via password_verify() incorrectly returns true.
If a user were able to create a password with a leading null byte
(unlikely, but syntactically valid), the issue would allow an
attacker to trivially compromise the victim's account by attempting
to sign in with a blank string.
For Debian 10 buster, these problems have been fixed in version
7.3.31-1~deb10u6.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | amd64 | php8.2-interbase | < 8.2.18-1~deb12u1 | php8.2-interbase_8.2.18-1~deb12u1_amd64.deb |
Debian | 11 | s390x | php7.4-snmp-dbgsym | < 7.4.33-1+deb11u1 | php7.4-snmp-dbgsym_7.4.33-1+deb11u1_s390x.deb |
Debian | 11 | armhf | php7.4-cli-dbgsym | < 7.4.33-1+deb11u1 | php7.4-cli-dbgsym_7.4.33-1+deb11u1_armhf.deb |
Debian | 11 | arm64 | libphp7.4-embed-dbgsym | < 7.4.33-1+deb11u1 | libphp7.4-embed-dbgsym_7.4.33-1+deb11u1_arm64.deb |
Debian | 11 | armel | php7.4-xmlrpc | < 7.4.33-1+deb11u5 | php7.4-xmlrpc_7.4.33-1+deb11u5_armel.deb |
Debian | 11 | armhf | php7.4-sybase | < 7.4.33-1+deb11u1 | php7.4-sybase_7.4.33-1+deb11u1_armhf.deb |
Debian | 11 | amd64 | php7.4-phpdbg | < 7.4.33-1+deb11u1 | php7.4-phpdbg_7.4.33-1+deb11u1_amd64.deb |
Debian | 11 | mips64el | php7.4-tidy-dbgsym | < 7.4.33-1+deb11u5 | php7.4-tidy-dbgsym_7.4.33-1+deb11u5_mips64el.deb |
Debian | 11 | armhf | libphp7.4-embed-dbgsym | < 7.4.33-1+deb11u1 | libphp7.4-embed-dbgsym_7.4.33-1+deb11u1_armhf.deb |
Debian | 12 | mips64el | php8.2-gd | < 8.2.18-1~deb12u1 | php8.2-gd_8.2.18-1~deb12u1_mips64el.deb |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
79.3%