Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2023-0568): PHP vulnerabilities

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2023-0568): PHP vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
02/16/2023
Created
03/29/2023
Added
03/22/2023
Modified
05/19/2023

Description

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. 

Solution(s)

  • ubuntu-upgrade-libapache2-mod-php7-0
  • ubuntu-upgrade-libapache2-mod-php7-2
  • ubuntu-upgrade-libapache2-mod-php7-4
  • ubuntu-upgrade-libapache2-mod-php8-1
  • ubuntu-upgrade-php7-0
  • ubuntu-upgrade-php7-0-cgi
  • ubuntu-upgrade-php7-0-cli
  • ubuntu-upgrade-php7-0-fpm
  • ubuntu-upgrade-php7-0-sqlite3
  • ubuntu-upgrade-php7-0-zip
  • ubuntu-upgrade-php7-2
  • ubuntu-upgrade-php7-2-cgi
  • ubuntu-upgrade-php7-2-cli
  • ubuntu-upgrade-php7-2-fpm
  • ubuntu-upgrade-php7-4
  • ubuntu-upgrade-php7-4-cgi
  • ubuntu-upgrade-php7-4-cli
  • ubuntu-upgrade-php7-4-fpm
  • ubuntu-upgrade-php8-1
  • ubuntu-upgrade-php8-1-cgi
  • ubuntu-upgrade-php8-1-cli
  • ubuntu-upgrade-php8-1-fpm

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;