ID CVE-2018-19935
Summary ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
References
Vulnerable Configurations
  • PHP 5.0.0 -
    cpe:2.3:a:php:php:5.0.0
  • PHP PHP 5.0.0 Beta1
    cpe:2.3:a:php:php:5.0.0:beta1
  • PHP PHP 5.0.0 Beta2
    cpe:2.3:a:php:php:5.0.0:beta2
  • PHP PHP 5.0.0 Beta3
    cpe:2.3:a:php:php:5.0.0:beta3
  • PHP PHP 5.0.0 Beta4
    cpe:2.3:a:php:php:5.0.0:beta4
  • PHP PHP 5.0.0 RC1
    cpe:2.3:a:php:php:5.0.0:rc1
  • PHP PHP 5.0.0 RC2
    cpe:2.3:a:php:php:5.0.0:rc2
  • PHP PHP 5.0.0 RC3
    cpe:2.3:a:php:php:5.0.0:rc3
  • PHP 5.0.1 -
    cpe:2.3:a:php:php:5.0.1
  • PHP 5.0.2 -
    cpe:2.3:a:php:php:5.0.2
  • PHP 5.0.3 -
    cpe:2.3:a:php:php:5.0.3
  • PHP 5.0.4 -
    cpe:2.3:a:php:php:5.0.4
  • PHP 5.0.5 -
    cpe:2.3:a:php:php:5.0.5
  • PHP 5.1.0
    cpe:2.3:a:php:php:5.1
  • PHP 5.1.0 -
    cpe:2.3:a:php:php:5.1.0
  • PHP PHP 5.1.1
    cpe:2.3:a:php:php:5.1.1
  • PHP 5.1.2 -
    cpe:2.3:a:php:php:5.1.2
  • PHP PHP 5.1.3
    cpe:2.3:a:php:php:5.1.3
  • PHP 5.1.4
    cpe:2.3:a:php:php:5.1.4
  • PHP 5.1.5 -
    cpe:2.3:a:php:php:5.1.5
  • PHP PHP 5.1.6
    cpe:2.3:a:php:php:5.1.6
  • PHP 5.2.0
    cpe:2.3:a:php:php:5.2.0
  • PHP 5.2.1 -
    cpe:2.3:a:php:php:5.2.1
  • PHP 5.2.2 -
    cpe:2.3:a:php:php:5.2.2
  • PHP 5.2.3 -
    cpe:2.3:a:php:php:5.2.3
  • PHP 5.2.4 -
    cpe:2.3:a:php:php:5.2.4
  • PHP 5.2.5 -
    cpe:2.3:a:php:php:5.2.5
  • PHP 5.2.6 -
    cpe:2.3:a:php:php:5.2.6
  • PHP 5.2.7 -
    cpe:2.3:a:php:php:5.2.7
  • PHP 5.2.8
    cpe:2.3:a:php:php:5.2.8
  • PHP 5.2.9 -
    cpe:2.3:a:php:php:5.2.9
  • PHP 5.2.10 -
    cpe:2.3:a:php:php:5.2.10
  • PHP 5.2.11 -
    cpe:2.3:a:php:php:5.2.11
  • PHP 5.2.12 -
    cpe:2.3:a:php:php:5.2.12
  • PHP 5.2.13 -
    cpe:2.3:a:php:php:5.2.13
  • PHP 5.2.14 -
    cpe:2.3:a:php:php:5.2.14
  • PHP 5.2.15 -
    cpe:2.3:a:php:php:5.2.15
  • PHP 5.2.16
    cpe:2.3:a:php:php:5.2.16
  • PHP 5.2.17
    cpe:2.3:a:php:php:5.2.17
  • PHP 5.3.0
    cpe:2.3:a:php:php:5.3.0
  • PHP 5.3.1 -
    cpe:2.3:a:php:php:5.3.1
  • PHP 5.3.2 -
    cpe:2.3:a:php:php:5.3.2
  • PHP 5.3.3 -
    cpe:2.3:a:php:php:5.3.3
  • PHP 5.3.4 -
    cpe:2.3:a:php:php:5.3.4
  • PHP 5.3.5
    cpe:2.3:a:php:php:5.3.5
  • PHP 5.3.6
    cpe:2.3:a:php:php:5.3.6
  • PHP 5.3.7 -
    cpe:2.3:a:php:php:5.3.7
  • PHP 5.3.8
    cpe:2.3:a:php:php:5.3.8
  • PHP 5.3.9 -
    cpe:2.3:a:php:php:5.3.9
  • PHP 5.3.10
    cpe:2.3:a:php:php:5.3.10
  • PHP 5.3.11 -
    cpe:2.3:a:php:php:5.3.11
  • PHP 5.3.12
    cpe:2.3:a:php:php:5.3.12
  • PHP 5.3.13
    cpe:2.3:a:php:php:5.3.13
  • PHP 5.3.14 -
    cpe:2.3:a:php:php:5.3.14
  • PHP 5.3.15 -
    cpe:2.3:a:php:php:5.3.15
  • PHP 5.3.16
    cpe:2.3:a:php:php:5.3.16
  • PHP 5.3.17
    cpe:2.3:a:php:php:5.3.17
  • PHP 5.3.18 -
    cpe:2.3:a:php:php:5.3.18
  • PHP 5.3.19 -
    cpe:2.3:a:php:php:5.3.19
  • PHP 5.3.20 -
    cpe:2.3:a:php:php:5.3.20
  • PHP 5.3.21 -
    cpe:2.3:a:php:php:5.3.21
  • PHP 5.3.22 -
    cpe:2.3:a:php:php:5.3.22
  • PHP 5.3.23 -
    cpe:2.3:a:php:php:5.3.23
  • PHP 5.3.24 -
    cpe:2.3:a:php:php:5.3.24
  • PHP 5.3.25 -
    cpe:2.3:a:php:php:5.3.25
  • PHP 5.3.26 -
    cpe:2.3:a:php:php:5.3.26
  • PHP 5.3.27 -
    cpe:2.3:a:php:php:5.3.27
  • PHP 5.3.28
    cpe:2.3:a:php:php:5.3.28
  • PHP 5.3.29 -
    cpe:2.3:a:php:php:5.3.29
  • PHP 5.4.0 -
    cpe:2.3:a:php:php:5.4.0
  • PHP 5.4.1
    cpe:2.3:a:php:php:5.4.1
  • PHP 5.4.2
    cpe:2.3:a:php:php:5.4.2
  • PHP 5.4.3
    cpe:2.3:a:php:php:5.4.3
  • PHP 5.4.4 -
    cpe:2.3:a:php:php:5.4.4
  • PHP 5.4.5 -
    cpe:2.3:a:php:php:5.4.5
  • PHP 5.4.6 -
    cpe:2.3:a:php:php:5.4.6
  • PHP 5.4.7 -
    cpe:2.3:a:php:php:5.4.7
  • PHP 5.4.8 -
    cpe:2.3:a:php:php:5.4.8
  • PHP 5.4.9 -
    cpe:2.3:a:php:php:5.4.9
  • PHP 5.4.10 -
    cpe:2.3:a:php:php:5.4.10
  • PHP 5.4.11 -
    cpe:2.3:a:php:php:5.4.11
  • PHP 5.4.12 -
    cpe:2.3:a:php:php:5.4.12
  • PHP 5.4.12 release candidate 1
    cpe:2.3:a:php:php:5.4.12:rc1
  • PHP 5.4.12 release candidate 2
    cpe:2.3:a:php:php:5.4.12:rc2
  • PHP 5.4.13 -
    cpe:2.3:a:php:php:5.4.13
  • PHP 5.4.13 release candidate 1
    cpe:2.3:a:php:php:5.4.13:rc1
  • PHP 5.4.14 -
    cpe:2.3:a:php:php:5.4.14
  • PHP 5.4.14 release candidate 1
    cpe:2.3:a:php:php:5.4.14:rc1
  • PHP 5.4.15 -
    cpe:2.3:a:php:php:5.4.15
  • PHP 5.4.15 release candidate 1
    cpe:2.3:a:php:php:5.4.15:rc1
  • PHP 5.4.16 -
    cpe:2.3:a:php:php:5.4.16
  • PHP 5.4.16 release candidate 1
    cpe:2.3:a:php:php:5.4.16:rc1
  • PHP 5.4.17 -
    cpe:2.3:a:php:php:5.4.17
  • PHP 5.4.18 -
    cpe:2.3:a:php:php:5.4.18
  • PHP 5.4.19
    cpe:2.3:a:php:php:5.4.19
  • PHP 5.4.20 -
    cpe:2.3:a:php:php:5.4.20
  • PHP 5.4.21 -
    cpe:2.3:a:php:php:5.4.21
  • PHP 5.4.22 -
    cpe:2.3:a:php:php:5.4.22
  • PHP 5.4.23 -
    cpe:2.3:a:php:php:5.4.23
  • PHP 5.4.24 -
    cpe:2.3:a:php:php:5.4.24
  • PHP 5.4.25 -
    cpe:2.3:a:php:php:5.4.25
  • PHP 5.4.26 -
    cpe:2.3:a:php:php:5.4.26
  • PHP 5.4.27 -
    cpe:2.3:a:php:php:5.4.27
  • PHP 5.4.28 -
    cpe:2.3:a:php:php:5.4.28
  • PHP 5.4.29 -
    cpe:2.3:a:php:php:5.4.29
  • PHP 5.4.30 -
    cpe:2.3:a:php:php:5.4.30
  • PHP 5.4.31 -
    cpe:2.3:a:php:php:5.4.31
  • PHP 5.4.32 -
    cpe:2.3:a:php:php:5.4.32
  • PHP 5.4.33 -
    cpe:2.3:a:php:php:5.4.33
  • PHP PHP 5.4.34
    cpe:2.3:a:php:php:5.4.34
  • PHP 5.4.35
    cpe:2.3:a:php:php:5.4.35
  • PHP 5.4.36
    cpe:2.3:a:php:php:5.4.36
  • PHP 5.4.37
    cpe:2.3:a:php:php:5.4.37
  • PHP 5.4.38
    cpe:2.3:a:php:php:5.4.38
  • PHP 5.4.39
    cpe:2.3:a:php:php:5.4.39
  • PHP 5.4.40
    cpe:2.3:a:php:php:5.4.40
  • PHP 5.4.41
    cpe:2.3:a:php:php:5.4.41
  • PHP 5.4.42
    cpe:2.3:a:php:php:5.4.42
  • PHP 5.4.43
    cpe:2.3:a:php:php:5.4.43
  • PHP 5.4.44
    cpe:2.3:a:php:php:5.4.44
  • PHP 5.4.45
    cpe:2.3:a:php:php:5.4.45
  • PHP 5.5.0 -
    cpe:2.3:a:php:php:5.5.0
  • PHP 5.5.0 alpha1
    cpe:2.3:a:php:php:5.5.0:alpha1
  • PHP 5.5.0 alpha2
    cpe:2.3:a:php:php:5.5.0:alpha2
  • PHP 5.5.0 alpha3
    cpe:2.3:a:php:php:5.5.0:alpha3
  • PHP 5.5.0 alpha4
    cpe:2.3:a:php:php:5.5.0:alpha4
  • PHP 5.5.0 alpha5
    cpe:2.3:a:php:php:5.5.0:alpha5
  • PHP 5.5.0 alpha6
    cpe:2.3:a:php:php:5.5.0:alpha6
  • PHP 5.5.0 beta1
    cpe:2.3:a:php:php:5.5.0:beta1
  • PHP 5.5.0 beta2
    cpe:2.3:a:php:php:5.5.0:beta2
  • PHP 5.5.0 beta3
    cpe:2.3:a:php:php:5.5.0:beta3
  • PHP 5.5.0 beta4
    cpe:2.3:a:php:php:5.5.0:beta4
  • PHP 5.5.0 release candidate 1
    cpe:2.3:a:php:php:5.5.0:rc1
  • PHP 5.5.0 release candidate 2
    cpe:2.3:a:php:php:5.5.0:rc2
  • PHP 5.5.1
    cpe:2.3:a:php:php:5.5.1
  • PHP 5.5.2 -
    cpe:2.3:a:php:php:5.5.2
  • PHP 5.5.3
    cpe:2.3:a:php:php:5.5.3
  • PHP 5.5.4 -
    cpe:2.3:a:php:php:5.5.4
  • PHP 5.5.5 -
    cpe:2.3:a:php:php:5.5.5
  • PHP 5.5.6 -
    cpe:2.3:a:php:php:5.5.6
  • PHP 5.5.7 -
    cpe:2.3:a:php:php:5.5.7
  • PHP 5.5.8 -
    cpe:2.3:a:php:php:5.5.8
  • PHP 5.5.9 -
    cpe:2.3:a:php:php:5.5.9
  • PHP 5.5.10 -
    cpe:2.3:a:php:php:5.5.10
  • PHP 5.5.11 -
    cpe:2.3:a:php:php:5.5.11
  • PHP 5.5.12 -
    cpe:2.3:a:php:php:5.5.12
  • PHP 5.5.13 -
    cpe:2.3:a:php:php:5.5.13
  • PHP 5.5.14 -
    cpe:2.3:a:php:php:5.5.14
  • PHP 5.5.15 -
    cpe:2.3:a:php:php:5.5.15
  • PHP 5.5.16 -
    cpe:2.3:a:php:php:5.5.16
  • PHP 5.5.17 -
    cpe:2.3:a:php:php:5.5.17
  • PHP 5.5.18 -
    cpe:2.3:a:php:php:5.5.18
  • PHP 5.5.19 -
    cpe:2.3:a:php:php:5.5.19
  • PHP 5.5.20 -
    cpe:2.3:a:php:php:5.5.20
  • PHP 5.5.21 -
    cpe:2.3:a:php:php:5.5.21
  • PHP 5.5.22 -
    cpe:2.3:a:php:php:5.5.22
  • PHP 5.5.23 -
    cpe:2.3:a:php:php:5.5.23
  • PHP 5.5.24 -
    cpe:2.3:a:php:php:5.5.24
  • PHP 5.5.25 -
    cpe:2.3:a:php:php:5.5.25
  • PHP 5.5.26 -
    cpe:2.3:a:php:php:5.5.26
  • PHP 5.5.27 -
    cpe:2.3:a:php:php:5.5.27
  • PHP 5.5.28
    cpe:2.3:a:php:php:5.5.28
  • PHP PHP 5.5.29
    cpe:2.3:a:php:php:5.5.29
  • PHP 5.5.30
    cpe:2.3:a:php:php:5.5.30
  • PHP 5.5.31
    cpe:2.3:a:php:php:5.5.31
  • PHP 5.5.32
    cpe:2.3:a:php:php:5.5.32
  • PHP 5.5.33
    cpe:2.3:a:php:php:5.5.33
  • PHP 5.5.34
    cpe:2.3:a:php:php:5.5.34
  • PHP 5.5.35
    cpe:2.3:a:php:php:5.5.35
  • PHP 5.5.36
    cpe:2.3:a:php:php:5.5.36
  • PHP 5.5.37
    cpe:2.3:a:php:php:5.5.37
  • PHP 5.5.38
    cpe:2.3:a:php:php:5.5.38
  • PHP 5.6.0 -
    cpe:2.3:a:php:php:5.6.0
  • PHP 5.6.0 alpha1
    cpe:2.3:a:php:php:5.6.0:alpha1
  • PHP 5.6.0 alpha2
    cpe:2.3:a:php:php:5.6.0:alpha2
  • PHP 5.6.0 alpha3
    cpe:2.3:a:php:php:5.6.0:alpha3
  • PHP 5.6.0 alpha4
    cpe:2.3:a:php:php:5.6.0:alpha4
  • PHP 5.6.0 alpha5
    cpe:2.3:a:php:php:5.6.0:alpha5
  • PHP 5.6.0 beta1
    cpe:2.3:a:php:php:5.6.0:beta1
  • PHP 5.6.0 beta2
    cpe:2.3:a:php:php:5.6.0:beta2
  • PHP 5.6.0 beta3
    cpe:2.3:a:php:php:5.6.0:beta3
  • PHP 5.6.0 beta4
    cpe:2.3:a:php:php:5.6.0:beta4
  • PHP 5.6.1 -
    cpe:2.3:a:php:php:5.6.1
  • PHP 5.6.2
    cpe:2.3:a:php:php:5.6.2
  • PHP 5.6.3 -
    cpe:2.3:a:php:php:5.6.3
  • PHP 5.6.4 -
    cpe:2.3:a:php:php:5.6.4
  • PHP 5.6.5 -
    cpe:2.3:a:php:php:5.6.5
  • PHP 5.6.6 -
    cpe:2.3:a:php:php:5.6.6
  • PHP 5.6.7 -
    cpe:2.3:a:php:php:5.6.7
  • PHP 5.6.8 -
    cpe:2.3:a:php:php:5.6.8
  • PHP 5.6.9 -
    cpe:2.3:a:php:php:5.6.9
  • PHP 5.6.10 -
    cpe:2.3:a:php:php:5.6.10
  • PHP 5.6.11 -
    cpe:2.3:a:php:php:5.6.11
  • PHP 5.6.12 -
    cpe:2.3:a:php:php:5.6.12
  • PHP 5.6.13 -
    cpe:2.3:a:php:php:5.6.13
  • PHP 5.6.14 -
    cpe:2.3:a:php:php:5.6.14
  • PHP 5.6.15 -
    cpe:2.3:a:php:php:5.6.15
  • PHP 5.6.16 -
    cpe:2.3:a:php:php:5.6.16
  • PHP 5.6.17 -
    cpe:2.3:a:php:php:5.6.17
  • PHP 5.6.18 -
    cpe:2.3:a:php:php:5.6.18
  • PHP 5.6.19 -
    cpe:2.3:a:php:php:5.6.19
  • PHP 5.6.20 -
    cpe:2.3:a:php:php:5.6.20
  • PHP 5.6.21 -
    cpe:2.3:a:php:php:5.6.21
  • PHP 5.6.22 -
    cpe:2.3:a:php:php:5.6.22
  • PHP 5.6.23 -
    cpe:2.3:a:php:php:5.6.23
  • PHP 5.6.24 -
    cpe:2.3:a:php:php:5.6.24
  • PHP 5.6.25 -
    cpe:2.3:a:php:php:5.6.25
  • PHP 5.6.26 -
    cpe:2.3:a:php:php:5.6.26
  • PHP 5.6.27 -
    cpe:2.3:a:php:php:5.6.27
  • PHP 5.6.28 -
    cpe:2.3:a:php:php:5.6.28
  • PHP 5.6.29 -
    cpe:2.3:a:php:php:5.6.29
  • PHP 5.6.30 -
    cpe:2.3:a:php:php:5.6.30
  • PHP 5.6.31
    cpe:2.3:a:php:php:5.6.31
  • PHP 5.6.32
    cpe:2.3:a:php:php:5.6.32
  • PHP 5.6.33
    cpe:2.3:a:php:php:5.6.33
  • PHP 5.6.34
    cpe:2.3:a:php:php:5.6.34
  • PHP 5.6.36
    cpe:2.3:a:php:php:5.6.36
  • PHP 7.0.0 -
    cpe:2.3:a:php:php:7.0.0
  • PHP 7.0.1 -
    cpe:2.3:a:php:php:7.0.1
  • PHP 7.0.2 -
    cpe:2.3:a:php:php:7.0.2
  • PHP 7.0.3 -
    cpe:2.3:a:php:php:7.0.3
  • PHP 7.0.4 -
    cpe:2.3:a:php:php:7.0.4
  • PHP 7.0.5 -
    cpe:2.3:a:php:php:7.0.5
  • PHP 7.0.6 -
    cpe:2.3:a:php:php:7.0.6
  • PHP 7.0.7 -
    cpe:2.3:a:php:php:7.0.7
  • PHP 7.0.8 -
    cpe:2.3:a:php:php:7.0.8
  • PHP 7.0.9 -
    cpe:2.3:a:php:php:7.0.9
  • PHP 7.0.10 -
    cpe:2.3:a:php:php:7.0.10
  • PHP 7.0.11 -
    cpe:2.3:a:php:php:7.0.11
  • PHP 7.0.12 -
    cpe:2.3:a:php:php:7.0.12
  • PHP 7.0.13 -
    cpe:2.3:a:php:php:7.0.13
  • PHP 7.0.14 -
    cpe:2.3:a:php:php:7.0.14
  • PHP 7.0.15 -
    cpe:2.3:a:php:php:7.0.15
  • PHP 7.0.16 -
    cpe:2.3:a:php:php:7.0.16
  • PHP 7.0.17 -
    cpe:2.3:a:php:php:7.0.17
  • PHP 7.0.18 -
    cpe:2.3:a:php:php:7.0.18
  • PHP 7.0.19 -
    cpe:2.3:a:php:php:7.0.19
  • PHP 7.0.20 -
    cpe:2.3:a:php:php:7.0.20
  • PHP 7.0.21 -
    cpe:2.3:a:php:php:7.0.21
  • PHP 7.0.22 -
    cpe:2.3:a:php:php:7.0.22
  • PHP 7.0.23 -
    cpe:2.3:a:php:php:7.0.23
  • PHP 7.0.24 -
    cpe:2.3:a:php:php:7.0.24
  • PHP 7.0.25 -
    cpe:2.3:a:php:php:7.0.25
  • PHP 7.0.26 -
    cpe:2.3:a:php:php:7.0.26
  • PHP 7.0.27 -
    cpe:2.3:a:php:php:7.0.27
  • PHP 7.0.28
    cpe:2.3:a:php:php:7.0.28
  • PHP 7.0.29
    cpe:2.3:a:php:php:7.0.29
  • PHP 7.0.30
    cpe:2.3:a:php:php:7.0.30
  • PHP 7.0.31
    cpe:2.3:a:php:php:7.0.31
  • PHP 7.1.0 -
    cpe:2.3:a:php:php:7.1.0
  • PHP 7.1.1 -
    cpe:2.3:a:php:php:7.1.1
  • PHP 7.1.2 -
    cpe:2.3:a:php:php:7.1.2
  • PHP 7.1.3 -
    cpe:2.3:a:php:php:7.1.3
  • PHP 7.1.4 -
    cpe:2.3:a:php:php:7.1.4
  • PHP 7.1.5 -
    cpe:2.3:a:php:php:7.1.5
  • PHP 7.1.6 -
    cpe:2.3:a:php:php:7.1.6
  • PHP 7.1.7 -
    cpe:2.3:a:php:php:7.1.7
  • PHP 7.1.8 -
    cpe:2.3:a:php:php:7.1.8
  • PHP 7.1.9 -
    cpe:2.3:a:php:php:7.1.9
  • PHP 7.1.10 -
    cpe:2.3:a:php:php:7.1.10
  • PHP 7.1.11 -
    cpe:2.3:a:php:php:7.1.11
  • PHP 7.1.12 -
    cpe:2.3:a:php:php:7.1.12
  • PHP 7.1.13 -
    cpe:2.3:a:php:php:7.1.13
  • PHP 7.1.14 -
    cpe:2.3:a:php:php:7.1.14
  • PHP 7.1.15 -
    cpe:2.3:a:php:php:7.1.15
  • PHP 7.1.16 -
    cpe:2.3:a:php:php:7.1.16
  • PHP 7.1.17 -
    cpe:2.3:a:php:php:7.1.17
  • PHP 7.1.18 -
    cpe:2.3:a:php:php:7.1.18
  • PHP 7.1.19 -
    cpe:2.3:a:php:php:7.1.19
  • PHP 7.1.20 -
    cpe:2.3:a:php:php:7.1.20
  • PHP 7.1.21 -
    cpe:2.3:a:php:php:7.1.21
  • PHP 7.1.22 -
    cpe:2.3:a:php:php:7.1.22
  • PHP 7.2.0 -
    cpe:2.3:a:php:php:7.2.0
  • PHP 7.2.1 -
    cpe:2.3:a:php:php:7.2.1
  • PHP 7.2.2 -
    cpe:2.3:a:php:php:7.2.2
  • PHP 7.2.3 -
    cpe:2.3:a:php:php:7.2.3
  • PHP 7.2.4 -
    cpe:2.3:a:php:php:7.2.4
  • PHP 7.2.5 -
    cpe:2.3:a:php:php:7.2.5
  • PHP 7.2.6 -
    cpe:2.3:a:php:php:7.2.6
  • PHP 7.2.7 -
    cpe:2.3:a:php:php:7.2.7
  • PHP 7.2.8 -
    cpe:2.3:a:php:php:7.2.8
  • PHP 7.2.9 -
    cpe:2.3:a:php:php:7.2.9
  • PHP 7.2.10 -
    cpe:2.3:a:php:php:7.2.10
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-476
CAPEC
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-207.NASL
    description This update for php7 fixes the following issues : Security issue fixed : - CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354). - CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522). - CVE-2018-19935: Fixed a Denial of Service in php_imap.c which could be triggered via an empty string in the message argument to imap_mail (bsc#1118832). This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-23
    modified 2019-02-22
    plugin id 122394
    published 2019-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122394
    title openSUSE Security Update : php7 (openSUSE-2019-207)
  • NASL family CGI abuses
    NASL id PHP_7_1_26.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.1.x prior to 7.1.26. It is, therefore, affected by multiple vulnerabilities: - An integer underflow condition exists in _gdContributionsAlloc function in gd_interpolation.c. An unauthenticated, remote attacker can have unspecified impact via vectors related to decrementing the u variable. (CVE-2016-10166) - A denial of service (DoS) vulnerability exists in ext/imap/php_imap.c. An unauthenticated, remote attacker can exploit this issue, via an empty string in the message argument to the imap_mail function, to cause the application to stop responding. (CVE-2018-19935) - A heap-based buffer overflow condition exists in gdImageColorMatch due to improper calculation of the allocated buffer size. An attacker can exploit this, via calling imagecolormatch function with crafted image data as parameters. (CVE-2019-6977)
    last seen 2019-02-21
    modified 2019-01-31
    plugin id 121510
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121510
    title PHP 7.1.x < 7.1.26 Multiple vulnerabilities.
  • NASL family CGI abuses
    NASL id PHP_7_2_14.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.14. It is, therefore, affected by multiple vulnerabilities: - An integer underflow condition exists in _gdContributionsAlloc function in gd_interpolation.c. An unauthenticated, remote attacker can have unspecified impact via vectors related to decrementing the u variable. (CVE-2016-10166) - A denial of service (DoS) vulnerability exists in ext/imap/php_imap.c. An unauthenticated, remote attacker can exploit this issue, via an empty string in the message argument to the imap_mail function, to cause the application to stop responding. (CVE-2018-19935)
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 121353
    published 2019-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121353
    title PHP 7.2.x < 7.2.14 Multiple vulnerabilities.
  • NASL family CGI abuses
    NASL id PHP_5_6_39.NASL
    description According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.39. It is, therefore, affected by an arbitrary command injection vulnerability via the IMAP_open mailbox parameter.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119764
    published 2018-12-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119764
    title PHP 5.6.x < 5.6.39 Arbitrary Command Injection Vulnerability
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0333-1.NASL
    description This update for php7 fixes the following issues : Security issue fixed : CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354). CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522). CVE-2018-19935: Fixed a Denial of Service in php_imap.c which could be triggered via an empty string in the message argument to imap_mail (bsc#1118832). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-13
    plugin id 122146
    published 2019-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122146
    title SUSE SLES12 Security Update : php7 (SUSE-SU-2019:0333-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1608.NASL
    description Vulnerabilities have been discovered in php5, a server-side, HTML-embedded scripting language. Note that this update includes a change to the default behavior for IMAP connections. See below for details. CVE-2018-19518 An argument injection vulnerability in imap_open() may allow a remote attacker to execute arbitrary OS commands on the IMAP server. The fix for the CVE-2018-19518 vulnerability included this additional note from the upstream developers : Starting with 5.6.38, rsh/ssh logins are disabled by default. Use imap.enable_insecure_rsh if you want to enable them. Note that the IMAP library does not filter mailbox names before passing them to rsh/ssh command, thus passing untrusted data to this function with rsh/ssh enabled is insecure. CVE-2018-19935 A NULL pointer dereference leads to an application crash and a denial of service via an empty string in the message argument to the imap_mail function of ext/imap/php_imap.c. For Debian 8 'Jessie', these problems have been fixed in version 5.6.39+dfsg-0+deb8u1. We recommend that you upgrade your php5 packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 119695
    published 2018-12-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119695
    title Debian DLA-1608-1 : php5 security update
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2019-1147.NASL
    description ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.(CVE-2018-19935) University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a '-oProxyCommand' argument.(CVE-2018-19518)
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 121132
    published 2019-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121132
    title Amazon Linux AMI : php56 / php70,php71,php72 (ALAS-2019-1147)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-DFE1F0BAC6.NASL
    description **PHP version 7.2.13** (06 Dec 2018) **ftp:** - Fixed bug php#77151 (ftp_close(): SSL_read on shutdown). (Remi) **CLI:** - Fixed bug php#77111 (php-win.exe corrupts unicode symbols from cli parameters). (Anatol) **Fileinfo:** - Fixed bug php#77095 (slowness regression in 7.2/7.3 (compared to 7.1)). (Anatol) **iconv:** - Fixed bug php#77147 (Fixing 60494 ignored ICONV_MIME_DECODE_CONTINUE_ON_ERROR). (cmb) **Core:** - Fixed bug php#77231 (Segfault when using convert.quoted-printable-encode filter). (Stas) **IMAP:** - Fixed bug php#77153 (imap_open allows to run arbitrary shell commands via mailbox parameter). (Stas) **ODBC:** - Fixed bug php#77079 (odbc_fetch_object has incorrect type signature). (Jon Allen) **Opcache:** - Fixed bug php#77058 (Type inference in opcache causes side effects). (Nikita) - Fixed bug php#77092 (array_diff_key() - segmentation fault). (Nikita) **Phar:** - Fixed bug php#77022 (PharData always creates new files with mode 0666). (Stas) - Fixed bug php#77143 (Heap Buffer Overflow (READ: 4) in phar_parse_pharfile). (Stas) **PGSQL:** - Fixed bug php#77047 (pg_convert has a broken regex for the 'TIME WITHOUT TIMEZONE' data type). (Andy Gajetzki) **SOAP:** - Fixed bug php#50675 (SoapClient can't handle object references correctly). (Cameron Porter) - Fixed bug php#76348 (WSDL_CACHE_MEMORY causes Segmentation fault). (cmb) - Fixed bug php#77141 (Signedness issue in SOAP when precision=-1). (cmb) **Sockets:** - Fixed bug php#67619 (Validate length on socket_write). (thiagooak) ---- **From upstream** **IMAP** - Fix php#77020 NULL pointer dereference in imap_mail CVE-2018-19935 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 120854
    published 2019-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120854
    title Fedora 28 : php (2018-dfe1f0bac6)
  • NASL family CGI abuses
    NASL id PHP_7_3_0.NASL
    description According to its banner, the version of PHP running on the remote web server is 7.3.0 [alpha|beta] prior to 7.3.0. It is, therefore, affected by an arbitrary command injection vulnerability via the IMAP_open mailbox parameter.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 111217
    published 2018-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111217
    title PHP 7.3.0 [alpha|beta] < 7.3.0 Arbitrary Command Injection Vulnerability
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4353.NASL
    description Multiple security issues were found in PHP, a widely-used open source general purpose scripting language: The EXIF module was susceptible to denial of service/information disclosure when parsing malformed images, the Apache module allowed cross-site-scripting via the body of a 'Transfer-Encoding: chunked' request and the IMAP extension performed insufficient input validation which can result in the execution of arbitrary shell commands in the imap_open() function and denial of service in the imap_mail() function.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 119561
    published 2018-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119561
    title Debian DSA-4353-1 : php7.0 - security update
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-7EBFE1E6F2.NASL
    description **PHP version 7.2.13** (06 Dec 2018) **ftp:** - Fixed bug php#77151 (ftp_close(): SSL_read on shutdown). (Remi) **CLI:** - Fixed bug php#77111 (php-win.exe corrupts unicode symbols from cli parameters). (Anatol) **Fileinfo:** - Fixed bug php#77095 (slowness regression in 7.2/7.3 (compared to 7.1)). (Anatol) **iconv:** - Fixed bug php#77147 (Fixing 60494 ignored ICONV_MIME_DECODE_CONTINUE_ON_ERROR). (cmb) **Core:** - Fixed bug php#77231 (Segfault when using convert.quoted-printable-encode filter). (Stas) **IMAP:** - Fixed bug php#77153 (imap_open allows to run arbitrary shell commands via mailbox parameter). (Stas) **ODBC:** - Fixed bug php#77079 (odbc_fetch_object has incorrect type signature). (Jon Allen) **Opcache:** - Fixed bug php#77058 (Type inference in opcache causes side effects). (Nikita) - Fixed bug php#77092 (array_diff_key() - segmentation fault). (Nikita) **Phar:** - Fixed bug php#77022 (PharData always creates new files with mode 0666). (Stas) - Fixed bug php#77143 (Heap Buffer Overflow (READ: 4) in phar_parse_pharfile). (Stas) **PGSQL:** - Fixed bug php#77047 (pg_convert has a broken regex for the 'TIME WITHOUT TIMEZONE' data type). (Andy Gajetzki) **SOAP:** - Fixed bug php#50675 (SoapClient can't handle object references correctly). (Cameron Porter) - Fixed bug php#76348 (WSDL_CACHE_MEMORY causes Segmentation fault). (cmb) - Fixed bug php#77141 (Signedness issue in SOAP when precision=-1). (cmb) **Sockets:** - Fixed bug php#67619 (Validate length on socket_write). (thiagooak) ---- **From upstream** **IMAP** - Fix php#77020 NULL pointer dereference in imap_mail CVE-2018-19935 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 120566
    published 2019-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120566
    title Fedora 29 : php (2018-7ebfe1e6f2)
refmap via4
bid 106143
confirm https://security.netapp.com/advisory/ntap-20181221-0003/
debian DSA-4353
misc https://bugs.php.net/bug.php?id=77020
mlist [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
Last major update 07-12-2018 - 04:29
Published 07-12-2018 - 04:29
Last modified 31-12-2018 - 11:20
Back to Top