{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3824","assignerOrgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","state":"PUBLISHED","assignerShortName":"php","dateReserved":"2023-07-21T16:57:23.334Z","datePublished":"2023-08-11T05:48:34.082Z","dateUpdated":"2025-02-13T17:01:48.673Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"PHP","vendor":"PHP Group","versions":[{"lessThan":"8.0.30","status":"affected","version":"8.0.*","versionType":"semver"},{"lessThan":"8.1.22","status":"affected","version":"8.1.*","versionType":"semver"},{"lessThan":"8.2.8","status":"affected","version":"8.2.*","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Niels Dossche"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>In PHP version 8.0.* before 8.0.30,&nbsp; 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.&nbsp;</p>"}],"value":"In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE."}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":9.4,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-119","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","shortName":"php","dateUpdated":"2023-09-05T22:06:20.112Z"},"references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/"},{"url":"https://security.netapp.com/advisory/ntap-20230825-0001/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html"}],"source":{"advisory":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccg","discovery":"INTERNAL"},"title":"Buffer overflow and overread in phar_dir_read()","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:08:50.466Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230825-0001/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html","tags":["x_transferred"]}]}]}}