Unrated severityNVD Advisory· Published Aug 11, 2023· Updated Feb 13, 2025
Buffer overflow and overread in phar_dir_read()
CVE-2023-3824
Description
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhvmitre
- lists.debian.org/debian-lts-announce/2023/09/msg00002.htmlmitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/mitre
- security.netapp.com/advisory/ntap-20230825-0001/mitre
News mentions
0No linked articles in our index yet.