Search for packages
Package details: pkg:deb/ubuntu/php7.0@7.0.33-0ubuntu0.16.04.11
purl pkg:deb/ubuntu/php7.0@7.0.33-0ubuntu0.16.04.11
Next non-vulnerable version 7.0.33-0ubuntu0.16.04.16
Latest non-vulnerable version 7.0.33-0ubuntu0.16.04.16
Risk 3.5
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-3wkt-v868-aaae
Aliases:
CVE-2020-7070
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
7.0.33-0ubuntu0.16.04.16
Affected by 0 other vulnerabilities.
VCID-4a8s-mv3h-aaam
Aliases:
CVE-2020-7062
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
7.0.33-0ubuntu0.16.04.14
Affected by 2 other vulnerabilities.
VCID-c9kq-tv9h-aaab
Aliases:
CVE-2020-7063
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.
7.0.33-0ubuntu0.16.04.14
Affected by 2 other vulnerabilities.
VCID-pmx1-7vev-aaaj
Aliases:
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
7.0.33-0ubuntu0.16.04.15
Affected by 1 other vulnerability.
VCID-seee-fa4h-aaaa
Aliases:
CVE-2020-7066
In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.
7.0.33-0ubuntu0.16.04.14
Affected by 2 other vulnerabilities.
VCID-wd6n-1hjd-aaaq
Aliases:
CVE-2020-7064
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
7.0.33-0ubuntu0.16.04.14
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-f15g-u367-aaac When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash. CVE-2020-7060
VCID-zzsa-7ucw-aaae When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash. CVE-2020-7059

Date Actor Action Vulnerability Source VulnerableCode Version