{"id":"CVE-2019-9021","details":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.","modified":"2026-03-20T11:31:21.488027Z","published":"2019-02-22T23:29:00.410Z","related":["ALSA-2020:1624","SUSE-RU-2019:0823-1","SUSE-SU-2019:0985-1","SUSE-SU-2019:14013-1","SUSE-SU-2019:1461-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:1572-1","openSUSE-SU-2019:1573-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4398"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106747"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107156"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190321-0001/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-2/"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77247"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"4b8f72da5dfb201af4e82dee960261d8657e414f"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"b3ad2be890e86c69cdc661739c74b677b46a53cb"},{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"643a161a24e662fd2afa9bf3591b105f4881e93e"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"b51be55fe5488a090f6b12200987f4c7afe8cfd3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.6.40"},{"introduced":"7.0.0"},{"fixed":"7.1.26"},{"introduced":"7.2.0"},{"fixed":"7.2.14"},{"introduced":"7.3.0"},{"fixed":"7.3.1"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9021.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}