6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.1%
Package : php5
Version : 5.6.40+dfsg-0+deb8u12
CVE ID : CVE-2019-11048
It has been discovered, that a vulnerability in php5, a server-side,
HTML-embedded scripting language, could lead to exhausted disk space on
the server. When using overly long filenames or field names, a memory
limit could be hit which results in stopping the upload but not cleaning
up behind.
Further the embedded version of "file" is vulnerable to CVE-2019-18218.
As it can not be exploited the same in php5 as in file, this issue is not
handled as an own CVE but just as a bug, that has been fixed here
(restrict the number of CDF_VECTOR elements to prevent a heap-based
buffer overflow (4-byte out-of-bounds write)).
For Debian 8 "Jessie", this problem has been fixed in version
5.6.40+dfsg-0+deb8u12.
We recommend that you upgrade your php5 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | arm64 | php7.3-bcmath-dbgsym | < 7.3.19-1~deb10u1 | php7.3-bcmath-dbgsym_7.3.19-1~deb10u1_arm64.deb |
Debian | 9 | ppc64el | php7.0-bcmath | < 7.0.33-0+deb9u8 | php7.0-bcmath_7.0.33-0+deb9u8_ppc64el.deb |
Debian | 9 | arm64 | php7.0-snmp-dbgsym | < 7.0.33-0+deb9u8 | php7.0-snmp-dbgsym_7.0.33-0+deb9u8_arm64.deb |
Debian | 9 | armel | php7.0-common-dbgsym | < 7.0.33-0+deb9u8 | php7.0-common-dbgsym_7.0.33-0+deb9u8_armel.deb |
Debian | 9 | ppc64el | php7.0-tidy | < 7.0.33-0+deb9u8 | php7.0-tidy_7.0.33-0+deb9u8_ppc64el.deb |
Debian | 10 | s390x | php7.3-soap | < 7.3.19-1~deb10u1 | php7.3-soap_7.3.19-1~deb10u1_s390x.deb |
Debian | 9 | armel | php7.0-sqlite3-dbgsym | < 7.0.33-0+deb9u8 | php7.0-sqlite3-dbgsym_7.0.33-0+deb9u8_armel.deb |
Debian | 10 | amd64 | php7.3-imap | < 7.3.19-1~deb10u1 | php7.3-imap_7.3.19-1~deb10u1_amd64.deb |
Debian | 10 | mipsel | php7.3-dev | < 7.3.19-1~deb10u1 | php7.3-dev_7.3.19-1~deb10u1_mipsel.deb |
Debian | 9 | mipsel | libapache2-mod-php7.0-dbgsym | < 7.0.33-0+deb9u8 | libapache2-mod-php7.0-dbgsym_7.0.33-0+deb9u8_mipsel.deb |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.1%