{"id":"CVE-2019-11043","details":"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.","modified":"2026-05-18T05:51:52.034170913Z","published":"2019-10-28T15:15:13.863Z","related":["ALSA-2019:3735","ALSA-2019:3736","SUSE-SU-2019:2809-1","SUSE-SU-2019:2819-1","SUSE-SU-2019:2909-1","SUSE-SU-2020:0522-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:2441-1","openSUSE-SU-2019:2457-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"19.04"},{"last_affected":"19.10"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"]},{"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"29"},{"last_affected":"30"},{"last_affected":"31"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_eus","extracted_events":[{"last_affected":"7.7"},{"last_affected":"8.1"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"},{"last_affected":"8.8"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_eus_compute_node","extracted_events":[{"last_affected":"7.7"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_arm_64","extracted_events":[{"last_affected":"8.0_aarch64"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_arm_64_eus","extracted_events":[{"last_affected":"8.1_aarch64"},{"last_affected":"8.2_aarch64"},{"last_affected":"8.4_aarch64"},{"last_affected":"8.6_aarch64"},{"last_affected":"8.8_aarch64"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_ibm_z_systems","extracted_events":[{"last_affected":"6.0_s390x"},{"last_affected":"7.0_s390x"},{"last_affected":"8.0_s390x"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_for_ibm_z_systems_eus","extracted_events":[{"last_affected":"7.7_s390x"},{"last_affected":"8.1_s390x"},{"last_affected":"8.2_s390x"},{"last_affected":"8.4_s390x"},{"last_affected":"8.6_s390x"},{"last_affected":"8.8_s390x"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_power_big_endian","extracted_events":[{"last_affected":"6.0_ppc64"},{"last_affected":"7.0_ppc64"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_power_big_endian_eus","extracted_events":[{"last_affected":"7.7_ppc64"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_power_little_endian","extracted_events":[{"last_affected":"7.0_ppc64le"},{"last_affected":"8.0_ppc64le"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_power_little_endian_eus","extracted_events":[{"last_affected":"7.7_ppc64le"},{"last_affected":"8.1_ppc64le"},{"last_affected":"8.2_ppc64le"},{"last_affected":"8.4_ppc64le"},{"last_affected":"8.6_ppc64le"},{"last_affected":"8.8_ppc64le"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_for_scientific_computing","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server_aus","extracted_events":[{"last_affected":"7.7"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_tus","extracted_events":[{"last_affected":"7.7"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"},{"last_affected":"8.8"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:software_collections","extracted_events":[{"last_affected":"1.0"}],"cpes":["cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"tenable:tenable.sc","extracted_events":[{"fixed":"5.19.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Jan/40"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3286"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3287"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3300"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3724"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3735"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3736"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0322"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/44"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191031-0003/"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT210919"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4166-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4166-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4552"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4553"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_19_36"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=78599"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"https://github.com/neex/phuip-fpizdam"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0221e9f827632942225586687a33cfd554860d5e"},{"fixed":"326cd05dae2eb411d5fdacede8a4bfa7a0798182"},{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"d41dd0b518cd831c50d0f441aa5fc561d55bff66"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"335008f6b2040e34cc3253b83e4a6377a95d6e6c"}],"database_specific":{"cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"7.1.0"},{"fixed":"7.1.33"},{"introduced":"7.2.0"},{"fixed":"7.2.24"},{"introduced":"7.3.0"},{"fixed":"7.3.11"}],"source":"CPE_FIELD"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11043.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}