{"id":"CVE-2020-7064","details":"In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.","aliases":["BIT-libphp-2020-7064","BIT-php-2020-7064","BIT-php-min-2020-7064"],"modified":"2026-05-18T05:52:38.205565852Z","published":"2020-04-01T04:15:13.693Z","related":["ALSA-2020:3662","SUSE-SU-2020:1199-1","SUSE-SU-2020:1546-1","SUSE-SU-2020:1714-1","SUSE-SU-2022:4067-1","openSUSE-SU-2020:0642-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"19.10"},{"last_affected":"20.04"}]},{"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"10.0"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"],"vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"15.1"}]},{"cpes":["cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"tenable:tenable.sc","extracted_events":[{"fixed":"5.19.0"}]}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200403-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4330-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4330-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4717"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4719"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=79282"},{"type":"FIX","url":"https://www.tenable.com/security/tns-2021-14"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"cc274342d26942fc162aff6203e23372b5715d80"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"4e330d3d488c232ad5f9769f1fa9471c9b5ad088"},{"introduced":"3c7824e16ec4c3cee417262445d2c2b66531c10f"},{"fixed":"acfdeccb2ee5821138a8d68b12177daff1e63e41"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"7.2.0"},{"fixed":"7.2.29"},{"introduced":"7.3.0"},{"fixed":"7.3.16"},{"introduced":"7.4.0"},{"fixed":"7.4.4"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-7064.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}]}