{"id":"CVE-2018-20783","details":"In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.","modified":"2026-04-11T12:08:38.431631Z","published":"2019-02-21T19:29:00.287Z","related":["ALSA-2020:1624","SUSE-RU-2019:0823-1","SUSE-SU-2019:0985-1","SUSE-SU-2019:14013-1","SUSE-SU-2019:1461-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:1572-1","openSUSE-SU-2019:1573-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.3"}]}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3566-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=77143"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"4653a1b260c9d640a292a9548e8def00edc5ca58"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"bf574c2b67a1f786e36cf679f41b758b973a82c4"},{"introduced":"0221e9f827632942225586687a33cfd554860d5e"},{"fixed":"e7e4f7dc83ab36dfab7b9df00fd1732caca94365"},{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"5223e555e0ef44c7202d8b1005ed9181a55b54a4"}],"database_specific":{"cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"5.6.39"},{"introduced":"7.0.0"},{"fixed":"7.0.33"},{"introduced":"7.1.0"},{"fixed":"7.1.25"},{"introduced":"7.2.0"},{"fixed":"7.2.13"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20783.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}