{"id":"CVE-2019-9020","details":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.","modified":"2026-05-15T12:03:57.112539916Z","published":"2019-02-22T23:29:00.330Z","related":["ALSA-2020:1624","SUSE-RU-2019:0823-1","SUSE-SU-2019:0985-1","SUSE-SU-2019:14013-1","SUSE-SU-2019:1461-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:1572-1","openSUSE-SU-2019:1573-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"42.3"}],"cpes":["cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107156"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190321-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4398"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=77249"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77242"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}