6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
8.2 High
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.3%
Package : php7.3
Version : 7.3.31-1~deb10u6
CVE ID : CVE-2024-2756 CVE-2024-3096
Security issues were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure
or incorrect validation of password hashes.
CVE-2024-2756
Marco Squarcina discovered that network and same-site attackers can
set a standard insecure cookie in the victim's browser which is
treated as a `__Host-` or `__Secure-` cookie by PHP applications.
This issue stems from an incomplete fix to CVE-2022-31629.
CVE-2024-3096
Eric Stern discovered that if a password stored with password_hash()
starts with a null byte (\x00), testing a blank string as the
password via password_verify() incorrectly returns true.
If a user were able to create a password with a leading null byte
(unlikely, but syntactically valid), the issue would allow an
attacker to trivially compromise the victim's account by attempting
to sign in with a blank string.
For Debian 10 buster, these problems have been fixed in version
7.3.31-1~deb10u6.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | armhf | php7.4-gmp-dbgsym | < 7.4.33-1+deb11u5 | php7.4-gmp-dbgsym_7.4.33-1+deb11u5_armhf.deb |
Debian | 11 | mipsel | php7.4-interbase-dbgsym | < 7.4.33-1+deb11u5 | php7.4-interbase-dbgsym_7.4.33-1+deb11u5_mipsel.deb |
Debian | 11 | armel | php7.4-opcache | < 7.4.33-1+deb11u5 | php7.4-opcache_7.4.33-1+deb11u5_armel.deb |
Debian | 11 | mips64el | php7.4-sqlite3-dbgsym | < 7.4.33-1+deb11u5 | php7.4-sqlite3-dbgsym_7.4.33-1+deb11u5_mips64el.deb |
Debian | 12 | mips64el | php8.2-ldap | < 8.2.18-1~deb12u1 | php8.2-ldap_8.2.18-1~deb12u1_mips64el.deb |
Debian | 11 | ppc64el | php7.4-fpm | < 7.4.33-1+deb11u5 | php7.4-fpm_7.4.33-1+deb11u5_ppc64el.deb |
Debian | 12 | amd64 | php8.2-fpm | < 8.2.18-1~deb12u1 | php8.2-fpm_8.2.18-1~deb12u1_amd64.deb |
Debian | 10 | amd64 | php7.3-dba | < 7.3.31-1~deb10u6 | php7.3-dba_7.3.31-1~deb10u6_amd64.deb |
Debian | 12 | armhf | php8.2-pgsql | < 8.2.18-1~deb12u1 | php8.2-pgsql_8.2.18-1~deb12u1_armhf.deb |
Debian | 12 | armel | php8.2-snmp | < 8.2.18-1~deb12u1 | php8.2-snmp_8.2.18-1~deb12u1_armel.deb |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
8.2 High
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.3%