{"id":"CVE-2020-7060","details":"When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.","aliases":["BIT-libphp-2020-7060","BIT-php-2020-7060","BIT-php-min-2020-7060"],"modified":"2026-05-15T12:04:16.013314720Z","published":"2020-02-10T08:15:12.797Z","related":["ALSA-2020:3662","SUSE-SU-2020:0397-1","SUSE-SU-2020:0522-1","SUSE-SU-2020:0622-1","SUSE-SU-2022:4067-1","openSUSE-SU-2020:0341-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"vendor_product":"debian:debian_linux"},{"vendor_product":"opensuse:leap","source":"CPE_FIELD","extracted_events":[{"last_affected":"15.1"}],"cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:communications_diameter_signaling_router","source":"CPE_FIELD","extracted_events":[{"introduced":"8.0"},{"last_affected":"8.4"}],"cpes":["cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"]},{"vendor_product":"tenable:tenable.sc","source":"CPE_FIELD","extracted_events":[{"fixed":"5.19.0"}],"cpes":["cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Feb/27"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Feb/31"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2021/Jan/3"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-57"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200221-0002/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4626"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4628"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=79037"},{"type":"FIX","url":"https://usn.ubuntu.com/4279-1/"},{"type":"FIX","url":"https://www.tenable.com/security/tns-2021-14"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}