Vulnerabilites related to facebook - hhvm
CVE-2016-1000006 (GCVE-0-2016-1000006)
Vulnerability from cvelistv5
Published
2019-11-19 14:51
Modified
2024-08-06 03:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.864Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000006" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg506329.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T14:51:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000006" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg506329.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1000006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2016-1000006", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000006" }, { "name": "https://www.mail-archive.com/debian-devel-changes@lists.debian.org/msg506329.html", "refsource": "MISC", "url": "https://www.mail-archive.com/debian-devel-changes@lists.debian.org/msg506329.html" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html", "refsource": "MISC", "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000006", "datePublished": "2019-11-19T14:51:15", "dateReserved": "2016-07-05T00:00:00", "dateUpdated": "2024-08-06T03:47:34.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6334 (GCVE-0-2018-6334)
Vulnerability from cvelistv5
Published
2018-12-31 20:00
Modified
2025-05-06 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-621 - Variable Extraction Error ()
Summary
Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6334", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T16:40:47.018290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T16:48:40.461Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.25.2" }, { "status": "affected", "version": "3.25.0" }, { "status": "affected", "version": "3.24.6" }, { "status": "affected", "version": "3.22.0" }, { "status": "affected", "version": "3.21.10" }, { "lessThan": "3.21.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-03-26T00:00:00.000Z", "datePublic": "2018-12-31T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-621", "description": "Variable Extraction Error (CWE-621)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-31T19:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-03-26", "ID": "CVE-2018-6334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.25.2" }, { "version_affected": "=\u003e", "version_value": "3.25.0" }, { "version_affected": "!=\u003e", "version_value": "3.24.6" }, { "version_affected": "=\u003e", "version_value": "3.22.0" }, { "version_affected": "!=\u003e", "version_value": "3.21.10" }, { "version_affected": "\u003c", "version_value": "3.21.10" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Variable Extraction Error (CWE-621)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff" }, { "name": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6334", "datePublished": "2018-12-31T20:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T16:48:40.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1000109 (GCVE-0-2016-1000109)
Vulnerability from cvelistv5
Published
2020-02-19 12:38
Modified
2024-08-06 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive).
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:55:26.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://httpoxy.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2016-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-19T12:38:56", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://httpoxy.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2016-07-17", "ID": "CVE-2016-1000109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://httpoxy.org/", "refsource": "MISC", "url": "https://httpoxy.org/" }, { "name": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" }, { "name": "https://www.facebook.com/security/advisories/cve-2016-1000109", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000109", "datePublished": "2020-02-19T12:38:56", "dateReserved": "2016-07-18T00:00:00", "dateUpdated": "2024-08-06T03:55:26.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11929 (GCVE-0-2019-11929)
Vulnerability from cvelistv5
Published
2019-10-02 19:07
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.24.0 Version: 4.23.2 Version: 4.23.0 < unspecified Version: 4.22.1 Version: 4.22.0 < unspecified Version: 4.21.1 Version: 4.21.0 < unspecified Version: 4.20.3 Version: 4.20.0 < unspecified Version: 4.19.2 Version: 4.19.0 < unspecified Version: 4.18.3 Version: 4.9.0 < unspecified Version: 4.8.5 Version: 4.0.0 < unspecified Version: 3.30.11 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/09/25/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.24.0" }, { "status": "affected", "version": "4.23.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.23.0", "versionType": "custom" }, { "status": "affected", "version": "4.22.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.22.0", "versionType": "custom" }, { "status": "affected", "version": "4.21.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "status": "affected", "version": "4.20.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.20.0", "versionType": "custom" }, { "status": "affected", "version": "4.19.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.19.0", "versionType": "custom" }, { "status": "affected", "version": "4.18.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.5" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.11" }, { "lessThanOrEqual": "3.30.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-02T19:07:18", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/09/25/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11929" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-02", "ID": "CVE-2019-11929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.24.0" }, { "version_affected": "!=\u003e", "version_value": "4.23.2" }, { "version_affected": "\u003e=", "version_value": "4.23.0" }, { "version_affected": "!=\u003e", "version_value": "4.22.1" }, { "version_affected": "\u003e=", "version_value": "4.22.0" }, { "version_affected": "!=\u003e", "version_value": "4.21.1" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "!=\u003e", "version_value": "4.20.3" }, { "version_affected": "\u003e=", "version_value": "4.20.0" }, { "version_affected": "!=\u003e", "version_value": "4.19.2" }, { "version_affected": "\u003e=", "version_value": "4.19.0" }, { "version_affected": "!=\u003e", "version_value": "4.18.3" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.5" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.11" }, { "version_affected": "\u003c=", "version_value": "3.30.10" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692" }, { "name": "https://hhvm.com/blog/2019/09/25/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/09/25/security-update.html" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11929", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11929" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11929", "datePublished": "2019-10-02T19:07:18", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1899 (GCVE-0-2020-1899)
Vulnerability from cvelistv5
Published
2021-03-11 00:55
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-822 - Untrusted Pointer Dereference ()
Summary
The unserialize() function supported a type code, "S", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.62.1 < unspecified Version: 4.62.0 Patch: 4.61.1 < unspecified Version: 4.61.0 Patch: 4.60.1 < unspecified Version: 4.60.0 Patch: 4.59.1 < unspecified Version: 4.59.0 Patch: 4.58.2 < unspecified Version: 4.58.0 < unspecified Patch: 4.57.1 < unspecified Version: 4.57.0 Patch: 4.56.1 < unspecified Version: 4.33.0 < unspecified Patch: 4.32.3 < unspecified Version: unspecified < 4.32.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.985Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.62.1", "versionType": "custom" }, { "status": "affected", "version": "4.62.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.61.1", "versionType": "custom" }, { "status": "affected", "version": "4.61.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.60.1", "versionType": "custom" }, { "status": "affected", "version": "4.60.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.59.1", "versionType": "custom" }, { "status": "affected", "version": "4.59.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.58.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.58.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.57.1", "versionType": "custom" }, { "status": "affected", "version": "4.57.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.32.3", "versionType": "custom" }, { "lessThan": "4.32.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "Untrusted Pointer Dereference (CWE-822)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-11T00:55:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-06-10", "ID": "CVE-2020-1899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.62.1" }, { "version_affected": "=", "version_value": "4.62.0" }, { "version_affected": "!\u003e=", "version_value": "4.61.1" }, { "version_affected": "=", "version_value": "4.61.0" }, { "version_affected": "!\u003e=", "version_value": "4.60.1" }, { "version_affected": "=", "version_value": "4.60.0" }, { "version_affected": "!\u003e=", "version_value": "4.59.1" }, { "version_affected": "=", "version_value": "4.59.0" }, { "version_affected": "!\u003e=", "version_value": "4.58.2" }, { "version_affected": "\u003e=", "version_value": "4.58.0" }, { "version_affected": "!\u003e=", "version_value": "4.57.1" }, { "version_affected": "=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!\u003e=", "version_value": "4.32.3" }, { "version_affected": "\u003c", "version_value": "4.32.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Untrusted Pointer Dereference (CWE-822)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/06/30/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1899", "datePublished": "2021-03-11T00:55:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1918 (GCVE-0-2020-1918)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-127 - Buffer Under-read ()
Summary
In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.98.1 < unspecified Version: 4.98.0 Patch: 4.97.1 < unspecified Version: 4.97.0 Patch: 4.96.1 < unspecified Version: 4.96.0 Patch: 4.95.1 < unspecified Version: 4.95.0 Patch: 4.94.1 < unspecified Version: 4.94.0 Patch: 4.93.2 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.2 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.3 < unspecified Version: unspecified < 4.56.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.98.1", "versionType": "custom" }, { "status": "affected", "version": "4.98.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.97.1", "versionType": "custom" }, { "status": "affected", "version": "4.97.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.96.1", "versionType": "custom" }, { "status": "affected", "version": "4.96.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.95.1", "versionType": "custom" }, { "status": "affected", "version": "4.95.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.94.1", "versionType": "custom" }, { "status": "affected", "version": "4.94.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.93.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.3", "versionType": "custom" }, { "lessThan": "4.56.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-127", "description": "Buffer Under-read (CWE-127)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:28", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-11-15", "ID": "CVE-2020-1918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.98.1" }, { "version_affected": "=", "version_value": "4.98.0" }, { "version_affected": "!\u003e=", "version_value": "4.97.1" }, { "version_affected": "=", "version_value": "4.97.0" }, { "version_affected": "!\u003e=", "version_value": "4.96.1" }, { "version_affected": "=", "version_value": "4.96.0" }, { "version_affected": "!\u003e=", "version_value": "4.95.1" }, { "version_affected": "=", "version_value": "4.95.0" }, { "version_affected": "!\u003e=", "version_value": "4.94.1" }, { "version_affected": "=", "version_value": "4.94.0" }, { "version_affected": "!\u003e=", "version_value": "4.93.2" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.2" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.3" }, { "version_affected": "\u003c", "version_value": "4.56.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Under-read (CWE-127)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/02/25/security-update.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1918", "datePublished": "2021-03-10T15:50:28", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11930 (GCVE-0-2019-11930)
Vulnerability from cvelistv5
Published
2019-12-04 16:25
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-763 - Release of Invalid Pointer or Reference
Summary
An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.28.2 Version: 4.28.0 < unspecified Version: 4.27.1 Version: 4.27.0 < unspecified Version: 4.26.1 Version: 4.26.0 < unspecified Version: 4.25.1 Version: 4.25.0 < unspecified Version: 4.24.1 Version: 4.24.0 < unspecified Version: 4.23.2 Version: 4.9.0 < unspecified Version: 4.8.6 Version: 4.0.0 < unspecified Version: 3.30.12 Version: unspecified < 3.30.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11930" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.28.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.28.0", "versionType": "custom" }, { "status": "affected", "version": "4.27.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.27.0", "versionType": "custom" }, { "status": "affected", "version": "4.26.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.26.0", "versionType": "custom" }, { "status": "affected", "version": "4.25.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.25.0", "versionType": "custom" }, { "status": "affected", "version": "4.24.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.24.0", "versionType": "custom" }, { "status": "affected", "version": "4.23.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.6" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.12" }, { "lessThan": "3.30.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-763", "description": "CWE-763: Release of Invalid Pointer or Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-04T16:25:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11930" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-28", "ID": "CVE-2019-11930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.28.2" }, { "version_affected": "\u003e=", "version_value": "4.28.0" }, { "version_affected": "!=\u003e", "version_value": "4.27.1" }, { "version_affected": "\u003e=", "version_value": "4.27.0" }, { "version_affected": "!=\u003e", "version_value": "4.26.1" }, { "version_affected": "\u003e=", "version_value": "4.26.0" }, { "version_affected": "!=\u003e", "version_value": "4.25.1" }, { "version_affected": "\u003e=", "version_value": "4.25.0" }, { "version_affected": "!=\u003e", "version_value": "4.24.1" }, { "version_affected": "\u003e=", "version_value": "4.24.0" }, { "version_affected": "!=\u003e", "version_value": "4.23.2" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.6" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.12" }, { "version_affected": "\u003c", "version_value": "3.30.12" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-763: Release of Invalid Pointer or Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36" }, { "name": "https://hhvm.com/blog/2019/10/28/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11930", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11930" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11930", "datePublished": "2019-12-04T16:25:19", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6345 (GCVE-0-2018-6345)
Vulnerability from cvelistv5
Published
2019-01-15 22:00
Modified
2024-08-05 06:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.30.2" }, { "lessThan": "unspecified", "status": "affected", "version": "3.30.0", "versionType": "custom" }, { "status": "affected", "version": "3.27.6" }, { "lessThan": "3.27.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-11T00:00:00", "datePublic": "2019-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-15T21:57:01", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-11", "ID": "CVE-2018-6345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.30.2" }, { "version_affected": "\u003e=", "version_value": "3.30.0" }, { "version_affected": "!=\u003e", "version_value": "3.27.6" }, { "version_affected": "\u003c", "version_value": "3.27.6" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3" }, { "name": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6345", "datePublished": "2019-01-15T22:00:00", "dateReserved": "2018-01-26T00:00:00", "dateUpdated": "2024-08-05T06:01:48.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11936 (GCVE-0-2019-11936)
Vulnerability from cvelistv5
Published
2019-12-04 16:25
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-626 - Null Byte Interaction Error (Poison Null Byte)
Summary
Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.28.2 Version: 4.28.0 < unspecified Version: 4.27.1 Version: 4.27.0 < unspecified Version: 4.26.1 Version: 4.26.0 < unspecified Version: 4.25.1 Version: 4.25.0 < unspecified Version: 4.24.1 Version: 4.24.0 < unspecified Version: 4.23.2 Version: 4.9.0 < unspecified Version: 4.8.6 Version: 4.0.0 < unspecified Version: 3.30.12 Version: unspecified < 3.30.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.412Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11936" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.28.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.28.0", "versionType": "custom" }, { "status": "affected", "version": "4.27.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.27.0", "versionType": "custom" }, { "status": "affected", "version": "4.26.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.26.0", "versionType": "custom" }, { "status": "affected", "version": "4.25.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.25.0", "versionType": "custom" }, { "status": "affected", "version": "4.24.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.24.0", "versionType": "custom" }, { "status": "affected", "version": "4.23.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.6" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.12" }, { "lessThan": "3.30.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-626", "description": "CWE-626: Null Byte Interaction Error (Poison Null Byte)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-04T16:25:20", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11936" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-28", "ID": "CVE-2019-11936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.28.2" }, { "version_affected": "\u003e=", "version_value": "4.28.0" }, { "version_affected": "!=\u003e", "version_value": "4.27.1" }, { "version_affected": "\u003e=", "version_value": "4.27.0" }, { "version_affected": "!=\u003e", "version_value": "4.26.1" }, { "version_affected": "\u003e=", "version_value": "4.26.0" }, { "version_affected": "!=\u003e", "version_value": "4.25.1" }, { "version_affected": "\u003e=", "version_value": "4.25.0" }, { "version_affected": "!=\u003e", "version_value": "4.24.1" }, { "version_affected": "\u003e=", "version_value": "4.24.0" }, { "version_affected": "!=\u003e", "version_value": "4.23.2" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.6" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.12" }, { "version_affected": "\u003c", "version_value": "3.30.12" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-626: Null Byte Interaction Error (Poison Null Byte)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2019/10/28/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11936", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11936" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11936", "datePublished": "2019-12-04T16:25:20", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1893 (GCVE-0-2020-1893)
Vulnerability from cvelistv5
Published
2020-03-03 15:00
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
Insufficient boundary checks when decoding JSON in TryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.45.1 Version: 4.45.0 Version: 4.44.1 Version: 4.44.0 Version: 4.43.1 Version: 4.43.0 Version: 4.42.1 Version: 4.42.0 Version: 4.41.1 Version: 4.41.0 Version: 4.40.1 Version: 4.40.0 Version: 4.39.1 Version: 4.39.0 Version: 4.38.1 Version: 4.33.0 < unspecified Version: 4.32.1 Version: 4.9.0 < unspecified Version: 4.8.7 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.45.1" }, { "status": "affected", "version": "4.45.0" }, { "status": "affected", "version": "4.44.1" }, { "status": "affected", "version": "4.44.0" }, { "status": "affected", "version": "4.43.1" }, { "status": "affected", "version": "4.43.0" }, { "status": "affected", "version": "4.42.1" }, { "status": "affected", "version": "4.42.0" }, { "status": "affected", "version": "4.41.1" }, { "status": "affected", "version": "4.41.0" }, { "status": "affected", "version": "4.40.1" }, { "status": "affected", "version": "4.40.0" }, { "status": "affected", "version": "4.39.1" }, { "status": "affected", "version": "4.39.0" }, { "status": "affected", "version": "4.38.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "status": "affected", "version": "4.32.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.7" }, { "lessThanOrEqual": "4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in TryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-03T15:00:26", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-02-20", "ID": "CVE-2020-1893", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.45.1" }, { "version_affected": "=", "version_value": "4.45.0" }, { "version_affected": "!=\u003e", "version_value": "4.44.1" }, { "version_affected": "=", "version_value": "4.44.0" }, { "version_affected": "!=\u003e", "version_value": "4.43.1" }, { "version_affected": "=", "version_value": "4.43.0" }, { "version_affected": "!=\u003e", "version_value": "4.42.1" }, { "version_affected": "=", "version_value": "4.42.0" }, { "version_affected": "!=\u003e", "version_value": "4.41.1" }, { "version_affected": "=", "version_value": "4.41.0" }, { "version_affected": "!=\u003e", "version_value": "4.40.1" }, { "version_affected": "=", "version_value": "4.40.0" }, { "version_affected": "!=\u003e", "version_value": "4.39.1" }, { "version_affected": "=", "version_value": "4.39.0" }, { "version_affected": "!=\u003e", "version_value": "4.38.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!=\u003e", "version_value": "4.32.1" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.7" }, { "version_affected": "\u003c=", "version_value": "4.8.6" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when decoding JSON in TryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/02/20/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1893", "datePublished": "2020-03-03T15:00:26", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11926 (GCVE-0-2019-11926)
Vulnerability from cvelistv5
Published
2019-09-06 18:46
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.21.0 Version: 4.20.2 Version: 4.20.0 < unspecified Version: 4.19.1 Version: 4.19.0 < unspecified Version: 4.18.2 Version: 4.18.0 < unspecified Version: 4.17.3 Version: 4.17.0 < unspecified Version: 4.16.4 Version: 4.16.0 < unspecified Version: 4.15.3 Version: 4.9.0 < unspecified Version: 4.8.4 Version: 4.0.0 < unspecified Version: 3.30.10 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11926" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.21.0" }, { "status": "affected", "version": "4.20.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.20.0", "versionType": "custom" }, { "status": "affected", "version": "4.19.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.19.0", "versionType": "custom" }, { "status": "affected", "version": "4.18.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.18.0", "versionType": "custom" }, { "status": "affected", "version": "4.17.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.17.0", "versionType": "custom" }, { "status": "affected", "version": "4.16.4" }, { "lessThan": "unspecified", "status": "affected", "version": "4.16.0", "versionType": "custom" }, { "status": "affected", "version": "4.15.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.4" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.10" }, { "lessThanOrEqual": "3.30.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-06T18:46:54", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11926" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-09-06", "ID": "CVE-2019-11926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.21.0" }, { "version_affected": "!=\u003e", "version_value": "4.20.2" }, { "version_affected": "\u003e=", "version_value": "4.20.0" }, { "version_affected": "!=\u003e", "version_value": "4.19.1" }, { "version_affected": "\u003e=", "version_value": "4.19.0" }, { "version_affected": "!=\u003e", "version_value": "4.18.2" }, { "version_affected": "\u003e=", "version_value": "4.18.0" }, { "version_affected": "!=\u003e", "version_value": "4.17.3" }, { "version_affected": "\u003e=", "version_value": "4.17.0" }, { "version_affected": "!=\u003e", "version_value": "4.16.4" }, { "version_affected": "\u003e=", "version_value": "4.16.0" }, { "version_affected": "!=\u003e", "version_value": "4.15.3" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.4" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.10" }, { "version_affected": "\u003c=", "version_value": "3.30.9" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2019/09/03/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11926", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11926" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11926", "datePublished": "2019-09-06T18:46:54", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3570 (GCVE-0-2019-3570)
Vulnerability from cvelistv5
Published
2019-07-18 15:42
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/cc331e4349e91706a673e2a09f1f2ea5bbb33815" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.8.1" }, { "status": "affected", "version": "4.8.0" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "4.7.0" }, { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.6.0" }, { "status": "affected", "version": "4.5.1" }, { "status": "affected", "version": "4.5.0" }, { "status": "affected", "version": "4.4.1" }, { "status": "affected", "version": "4.4.0" }, { "status": "affected", "version": "4.3.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.6" }, { "lessThanOrEqual": "3.30.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-06-10T00:00:00", "datePublic": "2019-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-18T15:42:25", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/cc331e4349e91706a673e2a09f1f2ea5bbb33815" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-06-10", "ID": "CVE-2019-3570", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.8.1" }, { "version_affected": "=", "version_value": "4.8.0" }, { "version_affected": "!=\u003e", "version_value": "4.7.1" }, { "version_affected": "=", "version_value": "4.7.0" }, { "version_affected": "!=\u003e", "version_value": "4.6.1" }, { "version_affected": "=", "version_value": "4.6.0" }, { "version_affected": "!=\u003e", "version_value": "4.5.1" }, { "version_affected": "=", "version_value": "4.5.0" }, { "version_affected": "!=\u003e", "version_value": "4.4.1" }, { "version_affected": "=", "version_value": "4.4.0" }, { "version_affected": "!=\u003e", "version_value": "4.3.1" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.6" }, { "version_affected": "\u003c=", "version_value": "3.30.5" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/cc331e4349e91706a673e2a09f1f2ea5bbb33815", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/cc331e4349e91706a673e2a09f1f2ea5bbb33815" }, { "name": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3570", "datePublished": "2019-07-18T15:42:25", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6873 (GCVE-0-2016-6873)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6873", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6337 (GCVE-0-2018-6337)
Vulnerability from cvelistv5
Published
2018-12-31 22:00
Modified
2025-05-06 16:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-212 - Improper Cross-boundary Removal of Sensitive Data ()
Summary
folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6337", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T16:36:10.630630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T16:39:21.216Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.26.3" }, { "lessThan": "unspecified", "status": "affected", "version": "3.26.0", "versionType": "custom" }, { "lessThan": "3.26.0", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "folly", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "v2018.08.09.00" }, { "lessThan": "unspecified", "status": "affected", "version": "v2017.12.11.00", "versionType": "custom" }, { "lessThan": "v2017.12.11.00", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-05-24T00:00:00.000Z", "datePublic": "2018-12-31T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "Improper Cross-boundary Removal of Sensitive Data (CWE-212)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-31T21:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-05-24", "ID": "CVE-2018-6337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.26.3" }, { "version_affected": "\u003e=", "version_value": "3.26.0" }, { "version_affected": "!\u003c", "version_value": "3.26.0" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "folly", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "v2018.08.09.00" }, { "version_affected": "\u003e=", "version_value": "v2017.12.11.00" }, { "version_affected": "!\u003c", "version_value": "v2017.12.11.00" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Cross-boundary Removal of Sensitive Data (CWE-212)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" }, { "name": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f", "refsource": "MISC", "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" }, { "name": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6337", "datePublished": "2018-12-31T22:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T16:39:21.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11925 (GCVE-0-2019-11925)
Vulnerability from cvelistv5
Published
2019-09-06 18:46
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.21.0 Version: 4.20.2 Version: 4.20.0 < unspecified Version: 4.19.1 Version: 4.19.0 < unspecified Version: 4.18.2 Version: 4.18.0 < unspecified Version: 4.17.3 Version: 4.17.0 < unspecified Version: 4.16.4 Version: 4.16.0 < unspecified Version: 4.15.3 Version: 4.9.0 < unspecified Version: 4.8.4 Version: 4.0.0 < unspecified Version: 3.30.10 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11925" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.21.0" }, { "status": "affected", "version": "4.20.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.20.0", "versionType": "custom" }, { "status": "affected", "version": "4.19.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.19.0", "versionType": "custom" }, { "status": "affected", "version": "4.18.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.18.0", "versionType": "custom" }, { "status": "affected", "version": "4.17.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.17.0", "versionType": "custom" }, { "status": "affected", "version": "4.16.4" }, { "lessThan": "unspecified", "status": "affected", "version": "4.16.0", "versionType": "custom" }, { "status": "affected", "version": "4.15.3" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.4" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.10" }, { "lessThanOrEqual": "3.30.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-06T18:46:54", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11925" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-09-06", "ID": "CVE-2019-11925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.21.0" }, { "version_affected": "!=\u003e", "version_value": "4.20.2" }, { "version_affected": "\u003e=", "version_value": "4.20.0" }, { "version_affected": "!=\u003e", "version_value": "4.19.1" }, { "version_affected": "\u003e=", "version_value": "4.19.0" }, { "version_affected": "!=\u003e", "version_value": "4.18.2" }, { "version_affected": "\u003e=", "version_value": "4.18.0" }, { "version_affected": "!=\u003e", "version_value": "4.17.3" }, { "version_affected": "\u003e=", "version_value": "4.17.0" }, { "version_affected": "!=\u003e", "version_value": "4.16.4" }, { "version_affected": "\u003e=", "version_value": "4.16.0" }, { "version_affected": "!=\u003e", "version_value": "4.15.3" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.4" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.10" }, { "version_affected": "\u003c=", "version_value": "3.30.9" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3" }, { "name": "https://hhvm.com/blog/2019/09/03/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11925", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11925" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11925", "datePublished": "2019-09-06T18:46:54", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1917 (GCVE-0-2020-1917)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.98.1 < unspecified Version: 4.98.0 Patch: 4.97.1 < unspecified Version: 4.97.0 Patch: 4.96.1 < unspecified Version: 4.96.0 Patch: 4.95.1 < unspecified Version: 4.95.0 Patch: 4.94.1 < unspecified Version: 4.94.0 Patch: 4.93.2 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.2 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.3 < unspecified Version: unspecified < 4.56.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.98.1", "versionType": "custom" }, { "status": "affected", "version": "4.98.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.97.1", "versionType": "custom" }, { "status": "affected", "version": "4.97.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.96.1", "versionType": "custom" }, { "status": "affected", "version": "4.96.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.95.1", "versionType": "custom" }, { "status": "affected", "version": "4.95.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.94.1", "versionType": "custom" }, { "status": "affected", "version": "4.94.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.93.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.3", "versionType": "custom" }, { "lessThan": "4.56.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-11-11T00:00:00", "descriptions": [ { "lang": "en", "value": "xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:28", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-11-11", "ID": "CVE-2020-1917", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.98.1" }, { "version_affected": "=", "version_value": "4.98.0" }, { "version_affected": "!\u003e=", "version_value": "4.97.1" }, { "version_affected": "=", "version_value": "4.97.0" }, { "version_affected": "!\u003e=", "version_value": "4.96.1" }, { "version_affected": "=", "version_value": "4.96.0" }, { "version_affected": "!\u003e=", "version_value": "4.95.1" }, { "version_affected": "=", "version_value": "4.95.0" }, { "version_affected": "!\u003e=", "version_value": "4.94.1" }, { "version_affected": "=", "version_value": "4.94.0" }, { "version_affected": "!\u003e=", "version_value": "4.93.2" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.2" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.3" }, { "version_affected": "\u003c", "version_value": "4.56.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/02/25/security-update.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1917", "datePublished": "2021-03-10T15:50:28", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6340 (GCVE-0-2018-6340)
Vulnerability from cvelistv5
Published
2018-12-31 22:00
Modified
2025-05-06 19:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6340", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T18:59:29.098252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T19:00:01.711Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.30.1" }, { "lessThan": "unspecified", "status": "affected", "version": "3.30.0", "versionType": "custom" }, { "status": "affected", "version": "3.27.5" }, { "lessThan": "3.27.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-18T00:00:00.000Z", "datePublic": "2018-12-31T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-31T21:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-18", "ID": "CVE-2018-6340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.30.1" }, { "version_affected": "\u003e=", "version_value": "3.30.0" }, { "version_affected": "!=\u003e", "version_value": "3.27.5" }, { "version_affected": "\u003c", "version_value": "3.27.5" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" }, { "name": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6340", "datePublished": "2018-12-31T22:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T19:00:01.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3557 (GCVE-0-2019-3557)
Vulnerability from cvelistv5
Published
2019-01-15 22:00
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.30.1" }, { "lessThan": "unspecified", "status": "affected", "version": "3.30.0", "versionType": "custom" }, { "status": "affected", "version": "3.27.5" }, { "lessThan": "3.27.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-01-09T00:00:00", "datePublic": "2019-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-15T21:57:01", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-01-09", "ID": "CVE-2019-3557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.30.1" }, { "version_affected": "\u003e=", "version_value": "3.30.0" }, { "version_affected": "!=\u003e", "version_value": "3.27.5" }, { "version_affected": "\u003c", "version_value": "3.27.5" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" }, { "name": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3557", "datePublished": "2019-01-15T22:00:00", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1000004 (GCVE-0-2016-1000004)
Vulnerability from cvelistv5
Published
2020-02-19 12:38
Modified
2024-08-06 03:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2016-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-19T12:38:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2016-06-21", "ID": "CVE-2016-1000004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" }, { "name": "https://www.facebook.com/security/advisories/cve-2016-1000004", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000004", "datePublished": "2020-02-19T12:38:48", "dateReserved": "2016-07-05T00:00:00", "dateUpdated": "2024-08-06T03:47:34.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1919 (GCVE-0-2020-1919)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.98.1 < unspecified Version: 4.98.0 Patch: 4.97.1 < unspecified Version: 4.97.0 Patch: 4.96.1 < unspecified Version: 4.96.0 Patch: 4.95.1 < unspecified Version: 4.95.0 Patch: 4.94.1 < unspecified Version: 4.94.0 Patch: 4.93.2 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.2 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.3 < unspecified Version: unspecified < 4.56.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.98.1", "versionType": "custom" }, { "status": "affected", "version": "4.98.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.97.1", "versionType": "custom" }, { "status": "affected", "version": "4.97.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.96.1", "versionType": "custom" }, { "status": "affected", "version": "4.96.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.95.1", "versionType": "custom" }, { "status": "affected", "version": "4.95.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.94.1", "versionType": "custom" }, { "status": "affected", "version": "4.94.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.93.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.3", "versionType": "custom" }, { "lessThan": "4.56.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:29", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-12-11", "ID": "CVE-2020-1919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.98.1" }, { "version_affected": "=", "version_value": "4.98.0" }, { "version_affected": "!\u003e=", "version_value": "4.97.1" }, { "version_affected": "=", "version_value": "4.97.0" }, { "version_affected": "!\u003e=", "version_value": "4.96.1" }, { "version_affected": "=", "version_value": "4.96.0" }, { "version_affected": "!\u003e=", "version_value": "4.95.1" }, { "version_affected": "=", "version_value": "4.95.0" }, { "version_affected": "!\u003e=", "version_value": "4.94.1" }, { "version_affected": "=", "version_value": "4.94.0" }, { "version_affected": "!\u003e=", "version_value": "4.93.2" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.2" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.3" }, { "version_affected": "\u003c", "version_value": "4.56.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/02/25/security-update.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1919", "datePublished": "2021-03-10T15:50:29", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1898 (GCVE-0-2020-1898)
Vulnerability from cvelistv5
Published
2021-03-11 00:55
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-674 - Uncontrolled Recursion ()
Summary
The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.62.1 < unspecified Version: 4.62.0 Patch: 4.61.1 < unspecified Version: 4.61.0 Patch: 4.60.1 < unspecified Version: 4.60.0 Patch: 4.59.1 < unspecified Version: 4.59.0 Patch: 4.58.2 < unspecified Version: 4.58.0 < unspecified Patch: 4.57.1 < unspecified Version: 4.57.0 Patch: 4.56.1 < unspecified Version: 4.33.0 < unspecified Patch: 4.32.3 < unspecified Version: unspecified < 4.32.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.62.1", "versionType": "custom" }, { "status": "affected", "version": "4.62.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.61.1", "versionType": "custom" }, { "status": "affected", "version": "4.61.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.60.1", "versionType": "custom" }, { "status": "affected", "version": "4.60.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.59.1", "versionType": "custom" }, { "status": "affected", "version": "4.59.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.58.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.58.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.57.1", "versionType": "custom" }, { "status": "affected", "version": "4.57.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.32.3", "versionType": "custom" }, { "lessThan": "4.32.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-674", "description": "Uncontrolled Recursion (CWE-674)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-11T00:55:18", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-06-09", "ID": "CVE-2020-1898", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.62.1" }, { "version_affected": "=", "version_value": "4.62.0" }, { "version_affected": "!\u003e=", "version_value": "4.61.1" }, { "version_affected": "=", "version_value": "4.61.0" }, { "version_affected": "!\u003e=", "version_value": "4.60.1" }, { "version_affected": "=", "version_value": "4.60.0" }, { "version_affected": "!\u003e=", "version_value": "4.59.1" }, { "version_affected": "=", "version_value": "4.59.0" }, { "version_affected": "!\u003e=", "version_value": "4.58.2" }, { "version_affected": "\u003e=", "version_value": "4.58.0" }, { "version_affected": "!\u003e=", "version_value": "4.57.1" }, { "version_affected": "=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!\u003e=", "version_value": "4.32.3" }, { "version_affected": "\u003c", "version_value": "4.32.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Recursion (CWE-674)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/06/30/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1898", "datePublished": "2021-03-11T00:55:18", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6332 (GCVE-0-2018-6332)
Vulnerability from cvelistv5
Published
2018-12-03 14:00
Modified
2025-05-06 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Denial of Service ()
Summary
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6332", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T19:01:10.412112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T19:01:27.181Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.24.4" }, { "lessThan": "unspecified", "status": "affected", "version": "3.22.0", "versionType": "custom" }, { "status": "affected", "version": "3.21.8" }, { "lessThan": "3.21.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-03-15T00:00:00.000Z", "datePublic": "2018-12-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-03T13:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-03-15", "ID": "CVE-2018-6332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.24.4" }, { "version_affected": "\u003e=", "version_value": "3.22.0" }, { "version_affected": "!=\u003e", "version_value": "3.21.8" }, { "version_affected": "\u003c", "version_value": "3.21.8" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6332", "datePublished": "2018-12-03T14:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T19:01:27.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3561 (GCVE-0-2019-3561)
Vulnerability from cvelistv5
Published
2019-04-29 15:32
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer ()
Summary
Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.501Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.0.4" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.5" }, { "lessThan": "unspecified", "status": "affected", "version": "3.30.0", "versionType": "custom" }, { "status": "affected", "version": "3.27.8" }, { "lessThan": "3.27.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-29T15:32:45", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-03-28", "ID": "CVE-2019-3561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.0.4" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.5" }, { "version_affected": "\u003e=", "version_value": "3.30.0" }, { "version_affected": "!=\u003e", "version_value": "3.27.8" }, { "version_affected": "\u003c", "version_value": "3.27.8" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75" }, { "name": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3561", "datePublished": "2019-04-29T15:32:45", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6871 (GCVE-0-2016-6871)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6871", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3556 (GCVE-0-2019-3556)
Vulnerability from cvelistv5
Published
2021-10-26 20:05
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ()
Summary
HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.83.1 < unspecified Version: 4.83.0 < unspecified Patch: 4.82.1 < unspecified Version: 4.82.0 < unspecified Patch: 4.81.1 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.1 < unspecified Version: 4.80.0 < unspecified Patch: 4.79.1 < unspecified Version: 4.79.0 < unspecified Patch: 4.78.1 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.2 < unspecified Version: unspecified < 4.56.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3556" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.83.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.83.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.82.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.82.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.81.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.80.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.79.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.79.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.78.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.2", "versionType": "custom" }, { "lessThan": "4.56.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "HHVM supports the use of an \"admin\" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper Limitation of a Pathname to a Restricted Directory (CWE-22)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-26T20:05:10", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3556" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-01-09", "ID": "CVE-2019-3556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.83.1" }, { "version_affected": "\u003e=", "version_value": "4.83.0" }, { "version_affected": "!\u003e=", "version_value": "4.82.1" }, { "version_affected": "\u003e=", "version_value": "4.82.0" }, { "version_affected": "!\u003e=", "version_value": "4.81.1" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.1" }, { "version_affected": "\u003e=", "version_value": "4.80.0" }, { "version_affected": "!\u003e=", "version_value": "4.79.1" }, { "version_affected": "\u003e=", "version_value": "4.79.0" }, { "version_affected": "!\u003e=", "version_value": "4.78.1" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.2" }, { "version_affected": "\u003c", "version_value": "4.56.2" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HHVM supports the use of an \"admin\" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory (CWE-22)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/11/12/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-3556", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-3556" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3556", "datePublished": "2021-10-26T20:05:10", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24036 (GCVE-0-2021-24036)
Vulnerability from cvelistv5
Published
2021-07-23 00:30
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | folly |
Patch: v2021.07.22.00 < unspecified Version: unspecified < v2021.07.22.00 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2021/07/20/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2021-24036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "folly", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "v2021.07.22.00", "versionType": "custom" }, { "lessThan": "v2021.07.22.00", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.118.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.118.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.117.1", "versionType": "custom" }, { "status": "affected", "version": "4.117.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.116.1", "versionType": "custom" }, { "status": "affected", "version": "4.116.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.115.1", "versionType": "custom" }, { "status": "affected", "version": "4.115.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.114.1", "versionType": "custom" }, { "status": "affected", "version": "4.114.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.113.1", "versionType": "custom" }, { "status": "affected", "version": "4.113.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.102.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.102.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.5", "versionType": "custom" }, { "lessThan": "4.80.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2021-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-23T00:30:16", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2021/07/20/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2021-24036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-05-04", "ID": "CVE-2021-24036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "folly", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "v2021.07.22.00" }, { "version_affected": "\u003c", "version_value": "v2021.07.22.00" } ] } }, { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.118.2" }, { "version_affected": "\u003e=", "version_value": "4.118.0" }, { "version_affected": "!\u003e=", "version_value": "4.117.1" }, { "version_affected": "=", "version_value": "4.117.0" }, { "version_affected": "!\u003e=", "version_value": "4.116.1" }, { "version_affected": "=", "version_value": "4.116.0" }, { "version_affected": "!\u003e=", "version_value": "4.115.1" }, { "version_affected": "=", "version_value": "4.115.0" }, { "version_affected": "!\u003e=", "version_value": "4.114.1" }, { "version_affected": "=", "version_value": "4.114.0" }, { "version_affected": "!\u003e=", "version_value": "4.113.1" }, { "version_affected": "=", "version_value": "4.113.0" }, { "version_affected": "!\u003e=", "version_value": "4.102.2" }, { "version_affected": "\u003e=", "version_value": "4.102.0" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.5" }, { "version_affected": "\u003c", "version_value": "4.80.5" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/07/20/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2021/07/20/security-update.html" }, { "name": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3", "refsource": "MISC", "url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3" }, { "name": "https://www.facebook.com/security/advisories/cve-2021-24036", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2021-24036" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24036", "datePublished": "2021-07-23T00:30:16", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6874 (GCVE-0-2016-6874)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "name": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6874", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1892 (GCVE-0-2020-1892)
Vulnerability from cvelistv5
Published
2020-03-03 15:00
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.45.1 Version: 4.45.0 Version: 4.44.1 Version: 4.44.0 Version: 4.43.1 Version: 4.43.0 Version: 4.42.1 Version: 4.42.0 Version: 4.41.1 Version: 4.41.0 Version: 4.40.1 Version: 4.40.0 Version: 4.39.1 Version: 4.39.0 Version: 4.38.1 Version: 4.33.0 < unspecified Version: 4.32.1 Version: 4.9.0 < unspecified Version: 4.8.7 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.45.1" }, { "status": "affected", "version": "4.45.0" }, { "status": "affected", "version": "4.44.1" }, { "status": "affected", "version": "4.44.0" }, { "status": "affected", "version": "4.43.1" }, { "status": "affected", "version": "4.43.0" }, { "status": "affected", "version": "4.42.1" }, { "status": "affected", "version": "4.42.0" }, { "status": "affected", "version": "4.41.1" }, { "status": "affected", "version": "4.41.0" }, { "status": "affected", "version": "4.40.1" }, { "status": "affected", "version": "4.40.0" }, { "status": "affected", "version": "4.39.1" }, { "status": "affected", "version": "4.39.0" }, { "status": "affected", "version": "4.38.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "status": "affected", "version": "4.32.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.7" }, { "lessThanOrEqual": "4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-03T15:00:25", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-02-20", "ID": "CVE-2020-1892", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.45.1" }, { "version_affected": "=", "version_value": "4.45.0" }, { "version_affected": "!=\u003e", "version_value": "4.44.1" }, { "version_affected": "=", "version_value": "4.44.0" }, { "version_affected": "!=\u003e", "version_value": "4.43.1" }, { "version_affected": "=", "version_value": "4.43.0" }, { "version_affected": "!=\u003e", "version_value": "4.42.1" }, { "version_affected": "=", "version_value": "4.42.0" }, { "version_affected": "!=\u003e", "version_value": "4.41.1" }, { "version_affected": "=", "version_value": "4.41.0" }, { "version_affected": "!=\u003e", "version_value": "4.40.1" }, { "version_affected": "=", "version_value": "4.40.0" }, { "version_affected": "!=\u003e", "version_value": "4.39.1" }, { "version_affected": "=", "version_value": "4.39.0" }, { "version_affected": "!=\u003e", "version_value": "4.38.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!=\u003e", "version_value": "4.32.1" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.7" }, { "version_affected": "\u003c=", "version_value": "4.8.6" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/02/20/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1892", "datePublished": "2020-03-03T15:00:26", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6870 (GCVE-0-2016-6870)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6870", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3569 (GCVE-0-2019-3569)
Vulnerability from cvelistv5
Published
2019-06-26 15:09
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-552 - Files or Directories Accessible to External Parties ()
Summary
HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.8.1" }, { "status": "affected", "version": "4.8.0" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "4.7.0" }, { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.6.0" }, { "status": "affected", "version": "4.5.1" }, { "status": "affected", "version": "4.5.0" }, { "status": "affected", "version": "4.4.1" }, { "status": "affected", "version": "4.4.0" }, { "status": "affected", "version": "4.3.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.6" }, { "lessThanOrEqual": "3.30.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "Files or Directories Accessible to External Parties (CWE-552)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-26T15:09:17", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-06-01", "ID": "CVE-2019-3569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.8.1" }, { "version_affected": "=", "version_value": "4.8.0" }, { "version_affected": "!=\u003e", "version_value": "4.7.1" }, { "version_affected": "=", "version_value": "4.7.0" }, { "version_affected": "!=\u003e", "version_value": "4.6.1" }, { "version_affected": "=", "version_value": "4.6.0" }, { "version_affected": "!=\u003e", "version_value": "4.5.1" }, { "version_affected": "=", "version_value": "4.5.0" }, { "version_affected": "!=\u003e", "version_value": "4.4.1" }, { "version_affected": "=", "version_value": "4.4.0" }, { "version_affected": "!=\u003e", "version_value": "4.3.1" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.6" }, { "version_affected": "\u003c=", "version_value": "3.30.5" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Files or Directories Accessible to External Parties (CWE-552)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed" }, { "name": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3569", "datePublished": "2019-06-26T15:09:17", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6872 (GCVE-0-2016-6872)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6872", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36937 (GCVE-0-2022-36937)
Vulnerability from cvelistv5
Published
2023-05-10 18:28
Modified
2025-01-27 18:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3.
Applications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2023/01/20/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-36937", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-27T18:25:01.414896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T18:25:06.548Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "4.172.1", "status": "affected", "version": "4.172.0", "versionType": "semver" }, { "lessThan": "4.171.1", "status": "affected", "version": "4.171.0", "versionType": "semver" }, { "lessThan": "4.170.2", "status": "affected", "version": "4.170.0", "versionType": "semver" }, { "lessThan": "4.169.2", "status": "affected", "version": "4.169.0", "versionType": "semver" }, { "lessThan": "1.168.2", "status": "affected", "version": "4.154.0", "versionType": "semver" }, { "lessThan": "4.153.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "dateAssigned": "2022-11-02T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3.\n\nApplications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1104: Use of Unmaintained Third Party Components", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T18:36:49.406Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2023/01/20/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36937", "datePublished": "2023-05-10T18:28:20.367Z", "dateReserved": "2022-07-27T17:00:55.528Z", "dateUpdated": "2025-01-27T18:25:06.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24025 (GCVE-0-2021-24025)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-03 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.98.1 < unspecified Version: 4.98.0 Patch: 4.97.1 < unspecified Version: 4.97.0 Patch: 4.96.1 < unspecified Version: 4.96.0 Patch: 4.95.1 < unspecified Version: 4.95.0 Patch: 4.94.1 < unspecified Version: 4.94.0 Patch: 4.93.2 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.2 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.3 < unspecified Version: unspecified < 4.56.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:10.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.98.1", "versionType": "custom" }, { "status": "affected", "version": "4.98.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.97.1", "versionType": "custom" }, { "status": "affected", "version": "4.97.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.96.1", "versionType": "custom" }, { "status": "affected", "version": "4.96.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.95.1", "versionType": "custom" }, { "status": "affected", "version": "4.95.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.94.1", "versionType": "custom" }, { "status": "affected", "version": "4.94.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.93.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.3", "versionType": "custom" }, { "lessThan": "4.56.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2021-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:30", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-01-27", "ID": "CVE-2021-24025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.98.1" }, { "version_affected": "=", "version_value": "4.98.0" }, { "version_affected": "!\u003e=", "version_value": "4.97.1" }, { "version_affected": "=", "version_value": "4.97.0" }, { "version_affected": "!\u003e=", "version_value": "4.96.1" }, { "version_affected": "=", "version_value": "4.96.0" }, { "version_affected": "!\u003e=", "version_value": "4.95.1" }, { "version_affected": "=", "version_value": "4.95.0" }, { "version_affected": "!\u003e=", "version_value": "4.94.1" }, { "version_affected": "=", "version_value": "4.94.0" }, { "version_affected": "!\u003e=", "version_value": "4.93.2" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.2" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.3" }, { "version_affected": "\u003c", "version_value": "4.56.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/02/25/security-update.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24025", "datePublished": "2021-03-10T15:50:30", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:14:10.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1916 (GCVE-0-2020-1916)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-04 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.83.1 < unspecified Version: 4.83.0 Patch: 4.82.1 < unspecified Version: 4.82.0 Patch: 4.81.1 < unspecified Version: 4.81.0 Patch: 4.80.1 < unspecified Version: 4.80.0 Patch: 4.79.1 < unspecified Version: 4.79.0 Patch: 4.78.1 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.2 < unspecified Version: unspecified < 4.56.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.83.1", "versionType": "custom" }, { "status": "affected", "version": "4.83.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.82.1", "versionType": "custom" }, { "status": "affected", "version": "4.82.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.81.1", "versionType": "custom" }, { "status": "affected", "version": "4.81.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.1", "versionType": "custom" }, { "status": "affected", "version": "4.80.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.79.1", "versionType": "custom" }, { "status": "affected", "version": "4.79.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.78.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.2", "versionType": "custom" }, { "lessThan": "4.56.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:27", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-30", "ID": "CVE-2020-1916", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.83.1" }, { "version_affected": "=", "version_value": "4.83.0" }, { "version_affected": "!\u003e=", "version_value": "4.82.1" }, { "version_affected": "=", "version_value": "4.82.0" }, { "version_affected": "!\u003e=", "version_value": "4.81.1" }, { "version_affected": "=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.1" }, { "version_affected": "=", "version_value": "4.80.0" }, { "version_affected": "!\u003e=", "version_value": "4.79.1" }, { "version_affected": "=", "version_value": "4.79.0" }, { "version_affected": "!\u003e=", "version_value": "4.78.1" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.2" }, { "version_affected": "\u003c", "version_value": "4.56.2" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/11/12/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1916", "datePublished": "2021-03-10T15:50:27", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:54:00.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1888 (GCVE-0-2020-1888)
Vulnerability from cvelistv5
Published
2020-03-03 15:00
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.45.1 Version: 4.45.0 Version: 4.44.1 Version: 4.44.0 Version: 4.43.1 Version: 4.43.0 Version: 4.42.1 Version: 4.42.0 Version: 4.41.1 Version: 4.41.0 Version: 4.40.1 Version: 4.40.0 Version: 4.39.1 Version: 4.39.0 Version: 4.38.1 Version: 4.33.0 < unspecified Version: 4.32.1 Version: 4.9.0 < unspecified Version: 4.8.7 Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.45.1" }, { "status": "affected", "version": "4.45.0" }, { "status": "affected", "version": "4.44.1" }, { "status": "affected", "version": "4.44.0" }, { "status": "affected", "version": "4.43.1" }, { "status": "affected", "version": "4.43.0" }, { "status": "affected", "version": "4.42.1" }, { "status": "affected", "version": "4.42.0" }, { "status": "affected", "version": "4.41.1" }, { "status": "affected", "version": "4.41.0" }, { "status": "affected", "version": "4.40.1" }, { "status": "affected", "version": "4.40.0" }, { "status": "affected", "version": "4.39.1" }, { "status": "affected", "version": "4.39.0" }, { "status": "affected", "version": "4.38.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "status": "affected", "version": "4.32.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.7" }, { "lessThanOrEqual": "4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-03T15:00:25", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-02-20", "ID": "CVE-2020-1888", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.45.1" }, { "version_affected": "=", "version_value": "4.45.0" }, { "version_affected": "!=\u003e", "version_value": "4.44.1" }, { "version_affected": "=", "version_value": "4.44.0" }, { "version_affected": "!=\u003e", "version_value": "4.43.1" }, { "version_affected": "=", "version_value": "4.43.0" }, { "version_affected": "!=\u003e", "version_value": "4.42.1" }, { "version_affected": "=", "version_value": "4.42.0" }, { "version_affected": "!=\u003e", "version_value": "4.41.1" }, { "version_affected": "=", "version_value": "4.41.0" }, { "version_affected": "!=\u003e", "version_value": "4.40.1" }, { "version_affected": "=", "version_value": "4.40.0" }, { "version_affected": "!=\u003e", "version_value": "4.39.1" }, { "version_affected": "=", "version_value": "4.39.0" }, { "version_affected": "!=\u003e", "version_value": "4.38.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!=\u003e", "version_value": "4.32.1" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.7" }, { "version_affected": "\u003c=", "version_value": "4.8.6" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13" }, { "name": "https://hhvm.com/blog/2020/02/20/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1888", "datePublished": "2020-03-03T15:00:25", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6335 (GCVE-0-2018-6335)
Vulnerability from cvelistv5
Published
2018-12-31 20:00
Modified
2025-05-06 19:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Denial of Service ()
Summary
A Malformed h2 frame can cause 'std::out_of_range' exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6335", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T19:01:52.053278Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T19:02:13.156Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "3.25.3" }, { "status": "affected", "version": "3.25.0" }, { "status": "affected", "version": "3.24.7" }, { "status": "affected", "version": "3.22.0" }, { "status": "affected", "version": "3.21.11" }, { "lessThan": "3.21.11", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-04-13T00:00:00.000Z", "datePublic": "2018-12-31T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A Malformed h2 frame can cause \u0027std::out_of_range\u0027 exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-31T19:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-04-13", "ID": "CVE-2018-6335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "3.25.3" }, { "version_affected": "=\u003e", "version_value": "3.25.0" }, { "version_affected": "!=\u003e", "version_value": "3.24.7" }, { "version_affected": "=\u003e", "version_value": "3.22.0" }, { "version_affected": "!=\u003e", "version_value": "3.21.11" }, { "version_affected": "\u003c", "version_value": "3.21.11" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Malformed h2 frame can cause \u0027std::out_of_range\u0027 exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html" }, { "name": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6335", "datePublished": "2018-12-31T20:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T19:02:13.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1921 (GCVE-0-2020-1921)
Vulnerability from cvelistv5
Published
2021-03-10 15:50
Modified
2024-08-04 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow ()
Summary
In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.98.1 < unspecified Version: 4.98.0 Patch: 4.97.1 < unspecified Version: 4.97.0 Patch: 4.96.1 < unspecified Version: 4.96.0 Patch: 4.95.1 < unspecified Version: 4.95.0 Patch: 4.94.1 < unspecified Version: 4.94.0 Patch: 4.93.2 < unspecified Version: 4.81.0 < unspecified Patch: 4.80.2 < unspecified Version: 4.57.0 < unspecified Patch: 4.56.3 < unspecified Version: unspecified < 4.56.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.98.1", "versionType": "custom" }, { "status": "affected", "version": "4.98.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.97.1", "versionType": "custom" }, { "status": "affected", "version": "4.97.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.96.1", "versionType": "custom" }, { "status": "affected", "version": "4.96.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.95.1", "versionType": "custom" }, { "status": "affected", "version": "4.95.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.94.1", "versionType": "custom" }, { "status": "affected", "version": "4.94.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.93.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.81.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.80.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.57.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.3", "versionType": "custom" }, { "lessThan": "4.56.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-10T15:50:30", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-12-14", "ID": "CVE-2020-1921", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.98.1" }, { "version_affected": "=", "version_value": "4.98.0" }, { "version_affected": "!\u003e=", "version_value": "4.97.1" }, { "version_affected": "=", "version_value": "4.97.0" }, { "version_affected": "!\u003e=", "version_value": "4.96.1" }, { "version_affected": "=", "version_value": "4.96.0" }, { "version_affected": "!\u003e=", "version_value": "4.95.1" }, { "version_affected": "=", "version_value": "4.95.0" }, { "version_affected": "!\u003e=", "version_value": "4.94.1" }, { "version_affected": "=", "version_value": "4.94.0" }, { "version_affected": "!\u003e=", "version_value": "4.93.2" }, { "version_affected": "\u003e=", "version_value": "4.81.0" }, { "version_affected": "!\u003e=", "version_value": "4.80.2" }, { "version_affected": "\u003e=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.3" }, { "version_affected": "\u003c", "version_value": "4.56.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2021/02/25/security-update.html", "refsource": "MISC", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1921", "datePublished": "2021-03-10T15:50:30", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:54:00.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6875 (GCVE-0-2016-6875)
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160811 CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "name": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" }, { "name": "[oss-security] 20160818 Re: CVE Requests Facebook HHVM", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6875", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-18T00:00:00", "dateUpdated": "2024-08-06T01:43:38.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1900 (GCVE-0-2020-1900)
Vulnerability from cvelistv5
Published
2021-03-11 00:55
Modified
2024-08-04 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free ()
Summary
When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Patch: 4.62.1 < unspecified Version: 4.62.0 Patch: 4.61.1 < unspecified Version: 4.61.0 Patch: 4.60.1 < unspecified Version: 4.60.0 Patch: 4.59.1 < unspecified Version: 4.59.0 Patch: 4.58.2 < unspecified Version: 4.58.0 < unspecified Patch: 4.57.1 < unspecified Version: 4.57.0 Patch: 4.56.1 < unspecified Version: 4.33.0 < unspecified Patch: 4.32.3 < unspecified Version: unspecified < 4.32.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "lessThan": "unspecified", "status": "unaffected", "version": "4.62.1", "versionType": "custom" }, { "status": "affected", "version": "4.62.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.61.1", "versionType": "custom" }, { "status": "affected", "version": "4.61.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.60.1", "versionType": "custom" }, { "status": "affected", "version": "4.60.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.59.1", "versionType": "custom" }, { "status": "affected", "version": "4.59.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.58.2", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.58.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.57.1", "versionType": "custom" }, { "status": "affected", "version": "4.57.0" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.56.1", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.33.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "4.32.3", "versionType": "custom" }, { "lessThan": "4.32.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-11T00:55:20", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-06-18", "ID": "CVE-2020-1900", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_value": "4.62.1" }, { "version_affected": "=", "version_value": "4.62.0" }, { "version_affected": "!\u003e=", "version_value": "4.61.1" }, { "version_affected": "=", "version_value": "4.61.0" }, { "version_affected": "!\u003e=", "version_value": "4.60.1" }, { "version_affected": "=", "version_value": "4.60.0" }, { "version_affected": "!\u003e=", "version_value": "4.59.1" }, { "version_affected": "=", "version_value": "4.59.0" }, { "version_affected": "!\u003e=", "version_value": "4.58.2" }, { "version_affected": "\u003e=", "version_value": "4.58.0" }, { "version_affected": "!\u003e=", "version_value": "4.57.1" }, { "version_affected": "=", "version_value": "4.57.0" }, { "version_affected": "!\u003e=", "version_value": "4.56.1" }, { "version_affected": "\u003e=", "version_value": "4.33.0" }, { "version_affected": "!\u003e=", "version_value": "4.32.3" }, { "version_affected": "\u003c", "version_value": "4.32.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2020/06/30/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3", "refsource": "MISC", "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1900", "datePublished": "2021-03-11T00:55:20", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:54:00.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11935 (GCVE-0-2019-11935)
Vulnerability from cvelistv5
Published
2019-12-04 16:25
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HHVM |
Version: 4.28.2 Version: 4.28.0 < unspecified Version: 4.27.1 Version: 4.27.0 < unspecified Version: 4.26.1 Version: 4.26.0 < unspecified Version: 4.25.1 Version: 4.25.0 < unspecified Version: 4.24.1 Version: 4.24.0 < unspecified Version: 4.23.2 Version: 4.9.0 < unspecified Version: 4.8.6 Version: 4.0.0 < unspecified Version: 3.30.12 Version: unspecified < 3.30.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11935" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HHVM", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "4.28.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.28.0", "versionType": "custom" }, { "status": "affected", "version": "4.27.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.27.0", "versionType": "custom" }, { "status": "affected", "version": "4.26.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.26.0", "versionType": "custom" }, { "status": "affected", "version": "4.25.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.25.0", "versionType": "custom" }, { "status": "affected", "version": "4.24.1" }, { "lessThan": "unspecified", "status": "affected", "version": "4.24.0", "versionType": "custom" }, { "status": "affected", "version": "4.23.2" }, { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "status": "affected", "version": "4.8.6" }, { "lessThan": "unspecified", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "status": "affected", "version": "3.30.12" }, { "lessThan": "3.30.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-04T16:25:20", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11935" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-28", "ID": "CVE-2019-11935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HHVM", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "4.28.2" }, { "version_affected": "\u003e=", "version_value": "4.28.0" }, { "version_affected": "!=\u003e", "version_value": "4.27.1" }, { "version_affected": "\u003e=", "version_value": "4.27.0" }, { "version_affected": "!=\u003e", "version_value": "4.26.1" }, { "version_affected": "\u003e=", "version_value": "4.26.0" }, { "version_affected": "!=\u003e", "version_value": "4.25.1" }, { "version_affected": "\u003e=", "version_value": "4.25.0" }, { "version_affected": "!=\u003e", "version_value": "4.24.1" }, { "version_affected": "\u003e=", "version_value": "4.24.0" }, { "version_affected": "!=\u003e", "version_value": "4.23.2" }, { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "!=\u003e", "version_value": "4.8.6" }, { "version_affected": "\u003e=", "version_value": "4.0.0" }, { "version_affected": "!=\u003e", "version_value": "3.30.12" }, { "version_affected": "\u003c", "version_value": "3.30.12" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://hhvm.com/blog/2019/10/28/security-update.html", "refsource": "CONFIRM", "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "name": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7" }, { "name": "https://www.facebook.com/security/advisories/cve-2019-11935", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11935" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11935", "datePublished": "2019-12-04T16:25:20", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1000005 (GCVE-0-2016-1000005)
Vulnerability from cvelistv5
Published
2020-02-19 12:38
Modified
2024-08-06 03:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mcrypt_get_block_size did not enforce that the provided "module" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2016-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "mcrypt_get_block_size did not enforce that the provided \"module\" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-19T12:38:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2016-06-21", "ID": "CVE-2016-1000005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mcrypt_get_block_size did not enforce that the provided \"module\" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89", "refsource": "CONFIRM", "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" }, { "name": "https://www.facebook.com/security/advisories/cve-2016-1000005", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000005", "datePublished": "2020-02-19T12:38:53", "dateReserved": "2016-07-05T00:00:00", "dateUpdated": "2024-08-06T03:47:34.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-07-23 01:15
Modified
2024-11-21 05:52
Severity ?
Summary
Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/07/20/security-update.html | Product, Vendor Advisory | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2021-24036 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/07/20/security-update.html | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2021-24036 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:folly:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED848EC8-F695-4D35-B067-D9E726DB8279", "versionEndExcluding": "2021.07.22.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE717551-482F-4C7B-BE36-294F96327735", "versionEndExcluding": "4.80.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A47916E5-F1B3-4C34-8E91-D205F4FAEF69", "versionEndIncluding": "4.102.1", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB9EA9C-DD7A-4CA3-B957-710AA082A3B9", "versionEndIncluding": "4.113.0", "versionStartIncluding": "4.103.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "90F2D55E-3F60-45D8-98E4-3E61E9E5AD17", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BDA3CE0-633D-43A7-8B88-E0A1F046BC47", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.116.0:*:*:*:*:*:*:*", "matchCriteriaId": "B613CAC3-7B20-4315-978D-D7F5FC92F873", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.117.0:*:*:*:*:*:*:*", "matchCriteriaId": "A93EB623-9A2B-4554-AC52-BB23E85A0CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.118.0:*:*:*:*:*:*:*", "matchCriteriaId": "26CBE42E-25C6-4150-9C0B-1B7CE5BEF03A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.118.1:*:*:*:*:*:*:*", "matchCriteriaId": "73A1E792-0EB5-40F8-A4D6-E6ECAABC8AE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1." }, { "lang": "es", "value": "Pasar un tama\u00f1o controlado por un atacante al crear un IOBuf podr\u00eda causar un desbordamiento de enteros, lo que llevar\u00eda a una escritura fuera de l\u00edmites en la pila con la posibilidad de ejecuci\u00f3n de c\u00f3digo remoto. Este problema afecta a las versiones de folly anteriores a la v2021.07.22.00. Este problema afecta a las versiones de HHVM anteriores a la 4.80.5, a todas las versiones entre la 4.81.0 y la 4.102.1, a todas las versiones entre la 4.103.0 y la 4.113.0, y a las versiones 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 y 4.118.1" } ], "id": "CVE-2021-24036", "lastModified": "2024-11-21T05:52:15.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-23T01:15:07.073", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3" }, { "source": "cve-assign@fb.com", "tags": [ "Product", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/07/20/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2021-24036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/07/20/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2021-24036" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "Recursividad infinita en wddx en Facebook HHVM en versiones anteriores a 3.15.0 permite a los atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/674.html\"\u003eCWE-674: Uncontrolled Recursion\u003c/a\u003e", "id": "CVE-2016-6875", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.140", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-31 19:29
Modified
2025-05-06 17:15
Severity ?
Summary
Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below).
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html | Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "310CA108-E16D-47C8-8769-DB691809E816", "versionEndIncluding": "3.21.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFBCFF4E-63FD-4C6E-906A-DEFAC841B089", "versionEndIncluding": "3.24.5", "versionStartIncluding": "3.21.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6074181-C5F1-4A94-9B18-14D817D5FCEF", "versionEndIncluding": "3.25.1", "versionStartIncluding": "3.24.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below)." }, { "lang": "es", "value": "Subidas del tipo \"Multipart-file\" llaman a variables para que se registren indebidamente en el \u00e1mbito global. En los casos en los que las variables no se declaran expl\u00edcitamente antes de usarse, esto puede provocar un comportamiento no esperado. Esto afecta a todas las versiones soportadas de HVVM antes del parche (en versiones anteriores a las 3.25.1, 3.24.5 y 3.21.9)." } ], "id": "CVE-2018-6334", "lastModified": "2025-05-06T17:15:50.730", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-31T19:29:00.323", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff" }, { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://hhvm.com/blog/2018/03/30/hhvm-3.25.2.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-621" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-15 22:29
Modified
2024-11-21 04:10
Severity ?
Summary
The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below).
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9172D83-BE0C-48DB-8042-626E37EA41C2", "versionEndIncluding": "3.27.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFB32970-5BE0-4FBE-AD2D-D06C96FDCFCB", "versionEndIncluding": "3.30.1", "versionStartIncluding": "3.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below)." }, { "lang": "es", "value": "La funci\u00f3n number_format es vulnerable a un problema de desbordamiento de memoria din\u00e1mica (heap) cuando su segundo argumento ($dec_points) es excesivamente largo. La implementaci\u00f3n interna de la funci\u00f3n provocar\u00e1 que se cree una cadena con una longitud inv\u00e1lida, que puede interactuar pobremente con otras funciones. Esto afecta a todas las versiones soportadas de HVVM (en versiones anteriores a las 3.30.1 y 3.27.5)." } ], "id": "CVE-2018-6345", "lastModified": "2024-11-21T04:10:31.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-15T22:29:00.250", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/190ffdf6c8b1ec443be202c7d69e63a7e3da25e3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:52
Severity ?
Summary
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "069C0B7D-5233-4EFF-BBA7-8B84D9227044", "versionEndExcluding": "4.56.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5E6E1A7-225A-4C45-9E2D-5ED55BA3AEA3", "versionEndIncluding": "4.80.1", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "9470E6A8-E2CB-4C72-8FEF-5CFF04E7E3C3", "versionEndIncluding": "4.93.1", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B9A3C-6A5A-45C4-A490-C13CF6D6A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "matchCriteriaId": "18D33DC0-E6A7-4DC6-8E9A-2B85842EC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0B9078D-3C25-45B2-B5F2-59585A47BACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B8F5C11-8610-4099-8A45-E6241F3D24E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FF13C3-19DC-4F53-BF9D-38AC89D647D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." }, { "lang": "es", "value": "Debido a c\u00e1lculos de tama\u00f1o de cadena incorrectos dentro de la funci\u00f3n preg_quote, una cadena de entrada grande pasada a la funci\u00f3n puede desencadenar un desbordamiento de enteros que conlleva a un desbordamiento de la pila.\u0026#xa0;Este problema afecta a versiones de HHVM anteriores a 4.56.3, todas las versiones entre 4.57.0 y 4.80.1, todas las versiones entre 4.81.0 y 4.93.1 y versiones 4.94.0, 4.95.0, 4.96.0, 4.97.0 , 4.98.0" } ], "id": "CVE-2021-24025", "lastModified": "2024-11-21T05:52:14.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:16.750", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-06 19:15
Modified
2024-11-21 04:21
Severity ?
Summary
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8B8512-9465-4BB0-9541-0F97ACCA1427", "versionEndIncluding": "3.30.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A84F7349-505B-4CBD-96B4-0E1F6D753859", "versionEndIncluding": "4.8.3", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636BA42-9847-4015-8B50-D810D7D47FB7", "versionEndIncluding": "4.15.2", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "22E2EDC9-EF7D-4EAD-8DE4-560BEBD6AAE8", "versionEndIncluding": "4.16.3", "versionStartIncluding": "4.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F58B96DF-AF88-4D3A-98B9-8ED942346A02", "versionEndIncluding": "4.17.2", "versionStartIncluding": "4.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "04418D87-68DC-425D-9200-D0EC241171BD", "versionEndIncluding": "4.18.1", "versionStartIncluding": "4.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE8D516-10E4-4911-B7ED-FC555C84A312", "versionEndIncluding": "4.20.1", "versionStartIncluding": "4.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B376181-2C7E-4411-B2F6-B10F0D15973B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." }, { "lang": "es", "value": "Las comprobaciones de l\u00edmites insuficientes cuando se procesa el marcador de bloque JPEG APP12 en la extensi\u00f3n GD, podr\u00edan permitir el acceso a la memoria fuera de l\u00edmites por medio de una entrada JPEG no v\u00e1lida construida maliciosamente. Este problema afecta a HHVM versiones anteriores a 3.30.9, todas las versiones entre 4.0.0 y 4.8.3, todas las versiones entre 4.9.0 y 4.15.2, y las versiones 4.16.0 hasta 4.16.3, 4.17.0 hasta 4.17.2 , 4.18.0 hasta 4.18.1, 4.19.0, y 4.20.0 hasta 4.20.1." } ], "id": "CVE-2019-11925", "lastModified": "2024-11-21T04:21:59.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-06T19:15:11.527", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/f1cd34e63c2a0d9702be3d41462db7bfd0ae7da3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11925" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:11
Severity ?
Summary
In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "069C0B7D-5233-4EFF-BBA7-8B84D9227044", "versionEndExcluding": "4.56.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DAD37C-9F51-4BE3-B045-537CA259F7F7", "versionEndExcluding": "4.80.2", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B78720F-AA79-459F-A66C-5C4D67D7EE31", "versionEndExcluding": "4.93.2", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B9A3C-6A5A-45C4-A490-C13CF6D6A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "matchCriteriaId": "18D33DC0-E6A7-4DC6-8E9A-2B85842EC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0B9078D-3C25-45B2-B5F2-59585A47BACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B8F5C11-8610-4099-8A45-E6241F3D24E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FF13C3-19DC-4F53-BF9D-38AC89D647D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." }, { "lang": "es", "value": "Las operaciones de archivos en memoria (es decir, usando fopen en un URI de datos) no restringieron apropiadamente la b\u00fasqueda negativa, permitiendo la lectura de la memoria antes del b\u00fafer en memoria.\u0026#xa0;Este problema afecta HHVM versiones anteriores a 4.56.3, todas las versiones entre 4.57.0 y 4.80.1, todas las versiones entre 4.81.0 y 4.93.1 y las versiones 4.94.0, 4.95.0, 4.96.0, 4.97.0 , 4.98.0" } ], "id": "CVE-2020-1918", "lastModified": "2024-11-21T05:11:36.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:14.377", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-127" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-19 13:15
Modified
2024-11-21 02:42
Severity ?
Summary
HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | Patch, Third Party Advisory | |
cve@mitre.org | https://httpoxy.org/ | Exploit, Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.facebook.com/security/advisories/cve-2016-1000109 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://httpoxy.org/ | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2016-1000109 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A60E75B9-EE8F-44ED-8E49-044B7AE45F0E", "versionEndExcluding": "3.9.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C1991-8D3D-42FA-B53F-067A890F2119", "versionEndIncluding": "3.12.4", "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F812F3-F2B5-4AC7-A8D8-9A56B2333ABC", "versionEndIncluding": "3.14.2", "versionStartIncluding": "3.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive)." }, { "lang": "es", "value": "HHVM no intenta abordar los conflictos de espacio de nombres de RFC 3875 section versi\u00f3n 4.1.18 y, por lo tanto, no protege las aplicaciones CGI de la presencia de datos de clientes no confiables en la variable de entorno HTTP_PROXY, lo que podr\u00eda permitir a atacantes remotos redireccionar el tr\u00e1fico HTTP saliente de una aplicaci\u00f3n CGI hacia un servidor proxy arbitrario por medio de un encabezado Proxy dise\u00f1ado en una petici\u00f3n HTTP, tambi\u00e9n se conoce como un problema \"httpoxy\". Este problema afecta a las versiones HHVM anteriores a 3.9.6, todas las versiones entre 3.10.0 y 3.12.4 (inclusive), y todas las versiones entre 3.13.0 y 3.14.2 (inclusive)." } ], "id": "CVE-2016-1000109", "lastModified": "2024-11-21T02:42:52.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-19T13:15:10.900", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://httpoxy.org/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://httpoxy.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:11
Severity ?
Summary
An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2020/11/12/security-update.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2020/11/12/security-update.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "6711FFC9-F4D3-438B-B596-30FCB4EAF015", "versionEndExcluding": "4.56.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "14D6DF29-4414-4A07-99E9-1BD568EC77A7", "versionEndExcluding": "4.78.1", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.79.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C83AAFF-2886-424B-A9BD-251B3AAC790B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.80.0:*:*:*:*:*:*:*", "matchCriteriaId": "73B27B4A-CD40-4493-BDCD-27F6ADD6C65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.81.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9447B-B287-484B-A14C-787F8481EBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.82.0:*:*:*:*:*:*:*", "matchCriteriaId": "15825F25-22B8-4863-A4E0-AD2EE66FA12C", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.83.0:*:*:*:*:*:*:*", "matchCriteriaId": "A04923E1-4DCE-4E34-8238-99BCCEEF4791", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0." }, { "lang": "es", "value": "Un c\u00e1lculo de tama\u00f1o incorrecto en la funci\u00f3n ldap_escape puede conllevar a un desbordamiento de enteros cuando es pasada una entrada demasiado larga, resultando en una escritura fuera de l\u00edmites.\u0026#xa0;Este problema afecta a HHVM versiones anteriores a 4.56.2, todas las versiones entre 4.57.0 y 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0" } ], "id": "CVE-2020-1916", "lastModified": "2024-11-21T05:11:36.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:14.173", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-21 04:22
Severity ?
Summary
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2019/09/25/security-update.html | Vendor Advisory | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-11929 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2019/09/25/security-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-11929 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9AF3712-A1D5-46D5-984E-41F5DF38BE20", "versionEndExcluding": "3.30.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FAA7FF-64A7-451F-A389-6CA4240D7871", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE55A7EC-B78A-401F-9F5C-9A89B7B0F30D", "versionEndIncluding": "4.18.2", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B376181-2C7E-4411-B2F6-B10F0D15973B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B5EDCE8-2484-422B-8D03-EF23B2303864", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "435AA02E-AECB-4C5F-AAC4-557A4F322AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F48125F-9D5F-4E4F-B8A8-D3BAE29255C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "235460ED-9ACD-4252-B74D-4CE5744B005D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C48CF3C-CD59-4C10-8264-BFF5409245AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "69E7E284-51AE-4F29-99BC-A3796F4C85D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4F184AD-E91D-461B-B240-6C24504323A8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0." }, { "lang": "es", "value": "Las comprobaciones de l\u00edmites insuficientes cuando se formatea n\u00fameros en number_format permiten el acceso de lectura y escritura a la memoria fuera de l\u00edmites, conllevando potencialmente a la ejecuci\u00f3n remota de c\u00f3digo. Este problema afecta a HHVM versiones anteriores a 3.30.10, todas las versiones entre 4.0.0 y 4.8.5, todas las versiones entre 4.9.0 y 4.18.2, y las versiones 4.19.0, 4.19.1, 4.20.0, 4.20.1 , 4.20.2, 4.21.0, 4.22.0, 4.23.0." } ], "id": "CVE-2019-11929", "lastModified": "2024-11-21T04:22:00.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-02T19:15:11.780", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/09/25/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/09/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11929" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion." }, { "lang": "es", "value": "Las funciones array_*_ recursive en Facebook HHVM en versiones anteriores a 3.15.0 permite a atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos, relacionados con la recursividad." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/674.html\"\u003eCWE-674: Uncontrolled Recursion\u003c/a\u003e", "id": "CVE-2016-6874", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.107", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "url": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-19 15:15
Modified
2024-11-21 02:42
Severity ?
Summary
hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "877E1E41-B6A5-4BB6-A52B-BB71186764FF", "versionEndExcluding": "3.12.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions." }, { "lang": "es", "value": "hhvm versiones anteriores a 3.12.11, presenta un uso de la memoria previamente liberada en las funciones serialize_memoize_param() y ResourceBundle::__construct()." } ], "id": "CVE-2016-1000006", "lastModified": "2024-11-21T02:42:50.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-19T15:15:11.007", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000006" }, { "source": "cve@mitre.org", "url": "https://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg506329.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg506329.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-03 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FC3F1B-FB6A-4EC4-8878-0C55652434F7", "versionEndExcluding": "4.8.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D25B1929-CF0F-4D0F-9268-6022762717FE", "versionEndIncluding": "4.32.0", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "87A4049D-2F34-4F15-83B4-0B620EB43500", "versionEndIncluding": "4.38.0", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "43688064-E2D3-461C-982C-A9702623A41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF8C8ED9-02DD-4F9C-9B76-751FACE3ED48", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "94FEC1E6-58FD-47C1-B05E-80BAE3840532", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "503ED662-BA21-469D-9FDC-73622786B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.43.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6F55273-3CA7-4432-9D43-951EC943E2B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.44.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BDE742-DE38-444B-9B40-6F14D6047B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "90646244-2B6C-402F-9835-9D540DE1EBC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." }, { "lang": "es", "value": "Comprobaciones de l\u00edmites insuficientes cuando se decodifica JSON en JSON_parser permiten un acceso de lectura en una memoria fuera de l\u00edmites, conllevando a un filtrado de informaci\u00f3n y a una DOS. Este problema afecta a HHVM versiones 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versiones entre 4.33.0 y 4.38.0 (inclusive), versiones entre 4.9.0 y 4.32.0 (inclusive), y versiones anteriores a 4.8.7." } ], "id": "CVE-2020-1892", "lastModified": "2024-11-21T05:11:33.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-03T15:15:11.993", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/dabd48caf74995e605f1700344f1ff4a5d83441d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-04 17:16
Modified
2024-11-21 04:22
Severity ?
Summary
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8452024-B97D-4B7B-BB28-AC04328E67B2", "versionEndExcluding": "3.30.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FAA7FF-64A7-451F-A389-6CA4240D7871", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "12366B66-DE3D-4387-83BC-E01C77393D58", "versionEndIncluding": "4.23.1", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "76F33DEA-0DB2-46B5-82C3-CA75D07C952D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B098BF0-EA28-44FA-A5D0-BDE05C2E9FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "0950ED00-A5DC-4DA6-906F-CDC03EE2DA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "D77D46F2-A17B-4CEA-A003-F7952EE3342D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "D53212BA-6BF8-4FE2-980C-371D5EF170E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "F182E9B3-838C-4AFA-94B5-77D30098712E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." }, { "lang": "es", "value": "Las comprobaciones de l\u00edmite insuficientes cuando se procesa una cadena en mb_ereg_replace permiten un acceso a la memoria fuera de l\u00edmites. Este problema afecta HHVM versiones anteriores a la versi\u00f3n 3.30.12, todas las versiones entre 4.0.0 y 4.8.5, todas las versiones entre 4.9.0 y 4.23.1, as\u00ed como las versiones 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0 y 4.28.1." } ], "id": "CVE-2019-11935", "lastModified": "2024-11-21T04:22:00.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-04T17:16:43.257", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11935" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-26 15:15
Modified
2024-11-21 04:42
Severity ?
Summary
HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D3D5055-D49B-4E8F-BC0A-08D779135A8B", "versionEndIncluding": "3.30.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C45FDDD-7D26-4B6D-92C5-2CC56744E640", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "66C30666-3B5A-48F4-B9D0-C10E9987D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2814F556-8F34-4944-BF56-16EE580460E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B387839-87D3-4864-8850-F80DBA120E15", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FAB1506-8A10-4D12-986F-9CB505613896", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E66B50A7-1F3B-484E-881C-E82A6BCAE451", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C20F7A3C-1AB7-4ACB-94F4-AE30E5A059E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C228A35-6BD8-4873-B0C1-ED85EAE3DD0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D0BC86A-393F-4929-BD95-9C5107BD2D68", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0972CED9-09D2-40F1-BD60-17ADA19645CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "915D9CF1-34C1-4608-A481-8B6ED43490FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "68C3110F-F78C-4701-9E9C-113A5544B762", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "91234ACF-30A1-4BA8-833C-32D21679801A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series." }, { "lang": "es", "value": "HHVM, cuando se usa con FastCGI vincular\u00eda por defecto a todos los interfaces disponibles. Este comportamiento podr\u00eda permitir accesos directos involuntarios individuales maliciosos para la aplicaci\u00f3n, lo cual podr\u00eda dar como resultado una revelaci\u00f3n de la informaci\u00f3n. Este error afecta a las versiones 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versiones 3.30.5 y abajo, y todas las versiones en el 4.0, 4.1, y 4.2 series" } ], "id": "CVE-2019-3569", "lastModified": "2024-11-21T04:42:11.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-26T15:15:09.887", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/06/10/hhvm-4.9.0.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-11 01:15
Modified
2024-11-21 05:11
Severity ?
Summary
When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2372F3F-5757-4097-BA67-61D7597F6D65", "versionEndExcluding": "4.32.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E83916FC-54F0-4A1B-99AD-0B81774170EE", "versionEndExcluding": "4.56.1", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F80C7A6-7FD9-4EAB-8533-F5C8ABF9F258", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*", "matchCriteriaId": "2006DF19-68B4-4139-AAAF-7F81B9742DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A9D0CEF-7EC2-421B-A45D-48D9663DB60B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*", "matchCriteriaId": "169B4C73-75D5-46FD-BADB-384ABFB9A6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "A48FC296-D7B6-4B58-A386-9F5F5F6294AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F702D76-27C2-4798-BF3C-242906E8E697", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC078675-9A81-4B74-8818-0FFE9AF66296", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." }, { "lang": "es", "value": "Cuando se anula la serializaci\u00f3n de un objeto con propiedades din\u00e1micas, HHVM necesita reservar previamente el tama\u00f1o completo de la matriz de propiedades din\u00e1micas antes de insertar algo en ella.\u0026#xa0;De lo contrario, la matriz podr\u00eda cambiar de tama\u00f1o, invalidando las referencias almacenadas previamente.\u0026#xa0;Esta reserva previa no estaba ocurriendo en HHVM versiones anteriores a v4.32.3, entre las versiones 4.33.0 y 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62 .0" } ], "id": "CVE-2020-1900", "lastModified": "2024-11-21T05:11:34.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-11T01:15:14.490", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-03 14:29
Modified
2025-05-06 19:15
Severity ?
Summary
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://hhvm.com/blog/2018/03/15/hhvm-3.25.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2018/03/15/hhvm-3.25.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1EF1502-F93C-4399-8FB9-2C1DE48095D8", "versionEndIncluding": "3.21.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "0CAF9519-6DC4-4028-BF5B-BF06D3467150", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests." }, { "lang": "es", "value": "Un problema de denegaci\u00f3n de servicio (DoS) potencial en la gesti\u00f3n de Proxygen de configuraciones HTTP2 no v\u00e1lidas puede provocar que el servidor emplee una cantidad desproporcionada de recursos. Esto afecta a todas las versiones soportadas de HHVM (3.24.3 y 3.21.7 y anteriores) cuando se utiliza el servidor proxygen para gestionar peticiones HTTP2." } ], "id": "CVE-2018-6332", "lastModified": "2025-05-06T19:15:53.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-03T14:29:00.457", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/03/15/hhvm-3.25.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-04 17:16
Modified
2024-11-21 04:22
Severity ?
Summary
Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8452024-B97D-4B7B-BB28-AC04328E67B2", "versionEndExcluding": "3.30.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FAA7FF-64A7-451F-A389-6CA4240D7871", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "12366B66-DE3D-4387-83BC-E01C77393D58", "versionEndIncluding": "4.23.1", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "76F33DEA-0DB2-46B5-82C3-CA75D07C952D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B098BF0-EA28-44FA-A5D0-BDE05C2E9FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "0950ED00-A5DC-4DA6-906F-CDC03EE2DA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "D77D46F2-A17B-4CEA-A003-F7952EE3342D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "D53212BA-6BF8-4FE2-980C-371D5EF170E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "F182E9B3-838C-4AFA-94B5-77D30098712E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." }, { "lang": "es", "value": "Varias funciones APC aceptan claves que contienen bytes nulos como entrada, conllevando a un truncamiento prematuro de la entrada. Este problema afecta a HHVM versiones anteriores a la versi\u00f3n 3.30.12, todas las versiones entre 4.0.0 y 4.8.5, todas las versiones entre 4.9.0 y 4.23.1, as\u00ed como las versiones 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0 y 4.28.1." } ], "id": "CVE-2019-11936", "lastModified": "2024-11-21T04:22:01.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-04T17:16:43.617", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/f57df6d8cf33cb14c40f52287da29360e7003373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11936" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-626" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-31 22:29
Modified
2025-05-06 19:15
Severity ?
Summary
The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "20625917-395C-4FE6-B681-8C8C2078549E", "versionEndIncluding": "3.27.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "902E260E-9611-4217-A38A-4143F6C5A165", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." }, { "lang": "es", "value": "La funci\u00f3n Memcache::getextendedstats puede utilizarse para provocar una lectura fuera de l\u00edmites. La explotaci\u00f3n de este problema requiere control sobre nombres y/o puertos del servidor \"memcatched\". Esto afecta a todas las versiones soportadas de HVVM (en versiones anteriores a las 3.30 y 3.27.4)." } ], "id": "CVE-2018-6340", "lastModified": "2025-05-06T19:15:54.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-31T22:29:00.327", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-29 16:29
Modified
2024-11-21 04:42
Severity ?
Summary
Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "420B9338-DAB4-4421-86B7-E3162134ABC8", "versionEndIncluding": "3.27.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "6187105D-0594-4D2B-8CA2-938CA8510286", "versionEndIncluding": "3.30.4", "versionStartIncluding": "3.28.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "05882444-86EB-4E0E-82C9-05B024E3A1DB", "versionEndIncluding": "4.0.3", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below)." }, { "lang": "es", "value": "Los controles de l\u00edmites insuficientes para las funciones strrpos y strripos permiten el acceso a la memoria fuera de l\u00edmites. Esto afecta a todas las versiones compatibles de HHVM (versiones 4.0.3, 3.30.4 y 3.27.7 e inferiores)." } ], "id": "CVE-2019-3561", "lastModified": "2024-11-21T04:42:10.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-29T16:29:00.890", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/04/03/hhvm-4.0.4.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-06 19:15
Modified
2024-11-21 04:21
Severity ?
Summary
Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2019/09/03/security-update.html | Third Party Advisory | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-11926 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2019/09/03/security-update.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-11926 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8B8512-9465-4BB0-9541-0F97ACCA1427", "versionEndIncluding": "3.30.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A84F7349-505B-4CBD-96B4-0E1F6D753859", "versionEndIncluding": "4.8.3", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636BA42-9847-4015-8B50-D810D7D47FB7", "versionEndIncluding": "4.15.2", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "22E2EDC9-EF7D-4EAD-8DE4-560BEBD6AAE8", "versionEndIncluding": "4.16.3", "versionStartIncluding": "4.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F58B96DF-AF88-4D3A-98B9-8ED942346A02", "versionEndIncluding": "4.17.2", "versionStartIncluding": "4.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "04418D87-68DC-425D-9200-D0EC241171BD", "versionEndIncluding": "4.18.1", "versionStartIncluding": "4.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE8D516-10E4-4911-B7ED-FC555C84A312", "versionEndIncluding": "4.20.1", "versionStartIncluding": "4.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B376181-2C7E-4411-B2F6-B10F0D15973B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1." }, { "lang": "es", "value": "Las comprobaciones de l\u00edmites insuficientes cuando de procesan marcadores M_SOFx a partir de encabezados JPEG en la extensi\u00f3n GD, podr\u00edan permitir el acceso a la memoria fuera de l\u00edmites por medio de una entrada JPEG no v\u00e1lida construida maliciosamente. Este problema afecta a HHVM versiones anteriores a 3.30.9, todas las versiones entre 4.0.0 y 4.8.3, todas las versiones entre 4.9.0 y 4.15.2, y las versiones 4.16.0 hasta 4.16.3, 4.17.0 hasta 4.17.2 , 4.18.0 hasta 4.18.1, 4.19.0, y 4.20.0 hasta 4.20.1." } ], "id": "CVE-2019-11926", "lastModified": "2024-11-21T04:21:59.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-06T19:15:11.607", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/f9680d21beaa9eb39d166e8810e29fbafa51ad15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://hhvm.com/blog/2019/09/03/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11926" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "Escritura fuera de l\u00edmites en las funciones (1) mb_detect_encoding, (2) mb_send_mail y (3) mb_detect_order en Facebook HHVM en versiones anteriores a 3.15.0 permite a atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2016-6870", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:00.983", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-15 22:29
Modified
2024-11-21 04:42
Severity ?
Summary
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "20625917-395C-4FE6-B681-8C8C2078549E", "versionEndIncluding": "3.27.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "B578D2A9-7CA2-41A1-85E5-CF1254A3CD4A", "versionEndIncluding": "3.30.0", "versionStartIncluding": "3.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." }, { "lang": "es", "value": "Las implementaciones de los flujos para bz2 y php://output implementaron incorrectamente sus funciones readImpl, devolviendo -1 constantemente. Este comportamiento provoc\u00f3 que algunas funciones, como stream_get_line, desencadenasen una lectura fuera de l\u00edmites al operar en tales flujos mal formados. Las implementaciones se actualizaron para que devuelvan valores v\u00e1lidos de forma consistente. Esto afecta a todas las versiones soportadas de HVVM (en versiones anteriores a las 3.30 y 3.27.4)." } ], "id": "CVE-2019-3557", "lastModified": "2024-11-21T04:42:09.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-15T22:29:00.377", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/01/14/hhvm-3.30.2.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-11 01:15
Modified
2024-11-21 05:11
Severity ?
Summary
The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2372F3F-5757-4097-BA67-61D7597F6D65", "versionEndExcluding": "4.32.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E83916FC-54F0-4A1B-99AD-0B81774170EE", "versionEndExcluding": "4.56.1", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F80C7A6-7FD9-4EAB-8533-F5C8ABF9F258", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*", "matchCriteriaId": "2006DF19-68B4-4139-AAAF-7F81B9742DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A9D0CEF-7EC2-421B-A45D-48D9663DB60B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*", "matchCriteriaId": "169B4C73-75D5-46FD-BADB-384ABFB9A6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "A48FC296-D7B6-4B58-A386-9F5F5F6294AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F702D76-27C2-4798-BF3C-242906E8E697", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC078675-9A81-4B74-8818-0FFE9AF66296", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." }, { "lang": "es", "value": "La funci\u00f3n fb_unserialize no impuso un l\u00edmite de profundidad para la deserializaci\u00f3n anidada.\u0026#xa0;Eso significaba que una cadena construida maliciosamente podr\u00eda causar que una deserializaci\u00f3n se repitiera, conllevando a un agotamiento de la pila.\u0026#xa0;Este problema afect\u00f3 a HHVM versiones anteriores a v4.32.3, entre las versiones 4.33.0 y 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0" } ], "id": "CVE-2020-1898", "lastModified": "2024-11-21T05:11:34.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-11T01:15:14.177", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "Auto recursividad en compact en Facebook HHVM en versiones anteriores a 3.15.0 permite a atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/674.html\"\u003eCWE-674: Uncontrolled Recursion\u003c/a\u003e", "id": "CVE-2016-6873", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en StringUtil::implosion en Facebook HHVM en versiones anteriores a 3.15.0 permite a atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2016-6872", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-31 22:29
Modified
2025-05-06 17:15
Severity ?
Summary
folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f | Patch, Third Party Advisory | |
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:folly:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5CE5C5F-6B35-4243-BE99-CFB558D74996", "versionEndIncluding": "2018.08.09.00", "versionStartIncluding": "2017.12.11.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1797EA50-9525-49CC-86B0-70DD9C573732", "versionEndExcluding": "3.26.3", "versionStartIncluding": "3.26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00." }, { "lang": "es", "value": "folly::secureRandom reutilizar\u00e1 un b\u00fafer entre los procesos padre e hijo cuando una bifurcaci\u00f3n() es llamada. Esto resultar\u00e1 en m\u00faltiples hijos bifurcados, produciendo resultados repetidos o similares. Esto afecta a las versiones de HHVM 3.26 anteriores a la 3.26.3 y a la librer\u00eda folly entre las versiones v2017.12.11.00 y v2018.08.09.00." } ], "id": "CVE-2018-6337", "lastModified": "2025-05-06T17:15:50.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-31T22:29:00.247", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" }, { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-31 19:29
Modified
2025-05-06 19:15
Severity ?
Summary
A Malformed h2 frame can cause 'std::out_of_range' exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "2163DCC3-41A2-4272-97EA-860A6A867914", "versionEndIncluding": "3.21.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:3.24.6:*:*:*:*:*:*:*", "matchCriteriaId": "E7E374ED-033B-4C0C-A056-797A23C17CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:3.25.2:*:*:*:*:*:*:*", "matchCriteriaId": "3290E2E7-0F98-418B-82E9-C1779E48A30F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Malformed h2 frame can cause \u0027std::out_of_range\u0027 exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests." }, { "lang": "es", "value": "Un frame h2 malformado puede provocar una excepci\u00f3n \u0027std::out_of_range\u0027 durante el an\u00e1lisis de metadatos prioritarios. Este comportamiento puede provocar una denegaci\u00f3n de servicio (DoS). Esto afecta a todas las versiones de HHVM soportadas (en versiones anteriores a las 3.25.2, 3.24.6 y 3.21.10)" } ], "id": "CVE-2018-6335", "lastModified": "2025-05-06T19:15:53.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-31T19:29:00.417", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/4cb57dd753a339654ca464c139db9871fe961d56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-03 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FC3F1B-FB6A-4EC4-8878-0C55652434F7", "versionEndExcluding": "4.8.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D25B1929-CF0F-4D0F-9268-6022762717FE", "versionEndIncluding": "4.32.0", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "87A4049D-2F34-4F15-83B4-0B620EB43500", "versionEndIncluding": "4.38.0", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "43688064-E2D3-461C-982C-A9702623A41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF8C8ED9-02DD-4F9C-9B76-751FACE3ED48", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "94FEC1E6-58FD-47C1-B05E-80BAE3840532", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "503ED662-BA21-469D-9FDC-73622786B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.43.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6F55273-3CA7-4432-9D43-951EC943E2B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.44.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BDE742-DE38-444B-9B40-6F14D6047B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "90646244-2B6C-402F-9835-9D540DE1EBC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." }, { "lang": "es", "value": "Comprobaciones de l\u00edmites insuficientes cuando se decodifica JSON en handleBackslash lee la memoria fuera de l\u00edmites, conllevando potencialmente a una DOS. Este problema afecta a HHVM versiones 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versiones entre 4.33.0 y 4.38.0 (inclusive), versiones entre 4.9.0 y 4.32.0 (inclusive), y versiones anteriores a 4.8.7." } ], "id": "CVE-2020-1888", "lastModified": "2024-11-21T05:11:33.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-03T15:15:11.883", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/b3679121bb3c7017ff04b4c08402ffff5cf59b13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-04 17:16
Modified
2024-11-21 04:22
Severity ?
Summary
An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8452024-B97D-4B7B-BB28-AC04328E67B2", "versionEndExcluding": "3.30.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FAA7FF-64A7-451F-A389-6CA4240D7871", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "12366B66-DE3D-4387-83BC-E01C77393D58", "versionEndIncluding": "4.23.1", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "76F33DEA-0DB2-46B5-82C3-CA75D07C952D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B098BF0-EA28-44FA-A5D0-BDE05C2E9FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "0950ED00-A5DC-4DA6-906F-CDC03EE2DA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "D77D46F2-A17B-4CEA-A003-F7952EE3342D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "D53212BA-6BF8-4FE2-980C-371D5EF170E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "F182E9B3-838C-4AFA-94B5-77D30098712E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1." }, { "lang": "es", "value": "Una liberaci\u00f3n inv\u00e1lida en mb_detect_order puede causar que la aplicaci\u00f3n se bloquee o potencialmente resulte en una ejecuci\u00f3n de c\u00f3digo remota. Este problema afecta HHVM versiones anteriores a la versi\u00f3n 3.30.12, todas las versiones entre 4.0.0 y 4.8.5, todas las versiones entre 4.9.0 y 4.23.1, as\u00ed como las versiones 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0 y 4.28.1." } ], "id": "CVE-2019-11930", "lastModified": "2024-11-21T04:22:00.307", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-04T17:16:43.087", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2019/10/28/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11930" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-763" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-763" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-11 01:15
Modified
2024-11-21 05:11
Severity ?
Summary
The unserialize() function supported a type code, "S", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9 | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2020/06/30/security-update.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2372F3F-5757-4097-BA67-61D7597F6D65", "versionEndExcluding": "4.32.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E83916FC-54F0-4A1B-99AD-0B81774170EE", "versionEndExcluding": "4.56.1", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F80C7A6-7FD9-4EAB-8533-F5C8ABF9F258", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*", "matchCriteriaId": "2006DF19-68B4-4139-AAAF-7F81B9742DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A9D0CEF-7EC2-421B-A45D-48D9663DB60B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*", "matchCriteriaId": "169B4C73-75D5-46FD-BADB-384ABFB9A6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "A48FC296-D7B6-4B58-A386-9F5F5F6294AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F702D76-27C2-4798-BF3C-242906E8E697", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC078675-9A81-4B74-8818-0FFE9AF66296", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." }, { "lang": "es", "value": "La funci\u00f3n unserialize() admit\u00eda un c\u00f3digo de tipo, \"S\", que estaba destinado a ser admitido solo para la serializaci\u00f3n APC.\u0026#xa0;Este c\u00f3digo de tipo permit\u00eda acceder a direcciones de memoria arbitrarias como si fueran objetos StringData est\u00e1ticos.\u0026#xa0;Este problema afect\u00f3 a HHVM versiones anteriores a v4.32.3, entre las versiones 4.33.0 y 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0" } ], "id": "CVE-2020-1899", "lastModified": "2024-11-21T05:11:34.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-11T01:15:14.333", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/06/30/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:11
Severity ?
Summary
Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "069C0B7D-5233-4EFF-BBA7-8B84D9227044", "versionEndExcluding": "4.56.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DAD37C-9F51-4BE3-B045-537CA259F7F7", "versionEndExcluding": "4.80.2", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B78720F-AA79-459F-A66C-5C4D67D7EE31", "versionEndExcluding": "4.93.2", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B9A3C-6A5A-45C4-A490-C13CF6D6A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "matchCriteriaId": "18D33DC0-E6A7-4DC6-8E9A-2B85842EC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0B9078D-3C25-45B2-B5F2-59585A47BACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B8F5C11-8610-4099-8A45-E6241F3D24E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FF13C3-19DC-4F53-BF9D-38AC89D647D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." }, { "lang": "es", "value": "Unos c\u00e1lculos de l\u00edmites incorrectos en la funci\u00f3n substr_compare podr\u00edan conllevar a una lectura fuera de l\u00edmites cuando el segundo argumento de cadena pasado es m\u00e1s largo que el primero.\u0026#xa0;Este problema afecta a HHVM versiones anteriores a 4.56.3, todas las versiones entre 4.57.0 y 4.80.1, todas las versiones entre 4.81.0 y 4.93.1 y las versiones 4.94.0, 4.95.0, 4.96.0, 4.97.0 , 4.98.0" } ], "id": "CVE-2020-1919", "lastModified": "2024-11-21T05:11:36.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:14.470", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:11
Severity ?
Summary
In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/02/25/security-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/02/25/security-update.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "069C0B7D-5233-4EFF-BBA7-8B84D9227044", "versionEndExcluding": "4.56.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DAD37C-9F51-4BE3-B045-537CA259F7F7", "versionEndExcluding": "4.80.2", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B78720F-AA79-459F-A66C-5C4D67D7EE31", "versionEndExcluding": "4.93.2", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B9A3C-6A5A-45C4-A490-C13CF6D6A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "matchCriteriaId": "18D33DC0-E6A7-4DC6-8E9A-2B85842EC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0B9078D-3C25-45B2-B5F2-59585A47BACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B8F5C11-8610-4099-8A45-E6241F3D24E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FF13C3-19DC-4F53-BF9D-38AC89D647D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." }, { "lang": "es", "value": "En la funci\u00f3n crypt, intentamos anular la finalizaci\u00f3n de un b\u00fafer usando el tama\u00f1o de la sal de entrada sin comprobar que el desplazamiento est\u00e9 dentro del b\u00fafer.\u0026#xa0;Este problema afecta a HHVM versiones anteriores a 4.56.3, todas las versiones entre 4.57.0 y 4.80.1, todas las versiones entre 4.81.0 y 4.93.1 y versiones 4.94.0, 4.95.0, 4.96.0, 4.97.0 , 4.98.0" } ], "id": "CVE-2020-1921", "lastModified": "2024-11-21T05:11:37.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:14.547", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-19 13:15
Modified
2024-11-21 02:42
Severity ?
Summary
mcrypt_get_block_size did not enforce that the provided "module" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.facebook.com/security/advisories/cve-2016-1000005 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2016-1000005 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E30D34-CAAC-49B1-96A0-57DCFC1D06FD", "versionEndExcluding": "3.9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "38334FB4-2311-4E24-B1A8-A667A2DC7121", "versionEndIncluding": "3.12.3", "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C0B828B-409C-4F67-82CD-FBE17BB084C0", "versionEndIncluding": "3.14.1", "versionStartIncluding": "3.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mcrypt_get_block_size did not enforce that the provided \"module\" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." }, { "lang": "es", "value": "La funci\u00f3n mcrypt_get_block_size no aplicaba que el par\u00e1metro \"module\" provisto era una cadena, conllevando a una confusi\u00f3n de tipo si otros tipos de datos fueron pasados. Este problema afecta a HHVM versiones anteriores a 3.9.5, todas las versiones entre 3.10.0 y 3.12.3 (inclusive), y todas las versiones entre 3.13.0 y 3.14.1 (inclusive)." } ], "id": "CVE-2016-1000005", "lastModified": "2024-11-21T02:42:50.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-19T13:15:10.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-26 20:15
Modified
2024-11-21 04:42
Severity ?
Summary
HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "6711FFC9-F4D3-438B-B596-30FCB4EAF015", "versionEndExcluding": "4.56.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "822519E7-63E6-45A1-B776-5AEFC7810A1E", "versionEndIncluding": "4.78.0", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.79.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C83AAFF-2886-424B-A9BD-251B3AAC790B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.80.0:*:*:*:*:*:*:*", "matchCriteriaId": "73B27B4A-CD40-4493-BDCD-27F6ADD6C65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.81.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9447B-B287-484B-A14C-787F8481EBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.82.0:*:*:*:*:*:*:*", "matchCriteriaId": "15825F25-22B8-4863-A4E0-AD2EE66FA12C", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.83.0:*:*:*:*:*:*:*", "matchCriteriaId": "A04923E1-4DCE-4E34-8238-99BCCEEF4791", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HHVM supports the use of an \"admin\" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0." }, { "lang": "es", "value": "HHVM soporta el uso de un servidor \"admin\" que acepta peticiones administrativas sobre HTTP. Uno de esos manejadores de peticiones, dump-pcre-cache, puede ser usado para dar salida a las expresiones regulares en cach\u00e9 del contexto de ejecuci\u00f3n actual en un archivo. El manejador toma un par\u00e1metro que especifica en qu\u00e9 parte del sistema de archivos es debido escribir estos datos. El par\u00e1metro no es comprobado, permitiendo a un usuario malicioso sobrescribir archivos arbitrarios en los que el usuario que ejecuta HHVM presenta acceso de escritura. Este problema afecta a las versiones de HHVM anteriores a 4.56.2, a todas las versiones entre la 4.57.0 y la 4.78.0, as\u00ed como a las versiones 4.79.0, 4.80.0, 4.81.0, 4.82.0 y 4.83.0" } ], "id": "CVE-2019-3556", "lastModified": "2024-11-21T04:42:09.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-26T20:15:07.603", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "source": "cve-assign@fb.com", "tags": [ "Broken Link" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/11/12/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3556" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-19 13:15
Modified
2024-11-21 02:42
Severity ?
Summary
Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.facebook.com/security/advisories/cve-2016-1000004 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2016-1000004 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E30D34-CAAC-49B1-96A0-57DCFC1D06FD", "versionEndExcluding": "3.9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "38334FB4-2311-4E24-B1A8-A667A2DC7121", "versionEndIncluding": "3.12.3", "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C0B828B-409C-4F67-82CD-FBE17BB084C0", "versionEndIncluding": "3.14.1", "versionStartIncluding": "3.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." }, { "lang": "es", "value": "Se emplearon verificaciones de tipo insuficientes antes de transmitir datos de entrada en SimpleXMLElement_exportNode y simplexml_import_dom. Este problema afecta a HHVM versiones anteriores a 3.9.5, todas las versiones entre 3.10.0 y 3.12.3 (inclusive), y todas las versiones entre 3.13.0 y 3.14.1 (inclusive)." } ], "id": "CVE-2016-1000004", "lastModified": "2024-11-21T02:42:49.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-19T13:15:10.760", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-03 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
Insufficient boundary checks when decoding JSON in TryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FC3F1B-FB6A-4EC4-8878-0C55652434F7", "versionEndExcluding": "4.8.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D25B1929-CF0F-4D0F-9268-6022762717FE", "versionEndIncluding": "4.32.0", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "87A4049D-2F34-4F15-83B4-0B620EB43500", "versionEndIncluding": "4.38.0", "versionStartIncluding": "4.33.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "43688064-E2D3-461C-982C-A9702623A41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF8C8ED9-02DD-4F9C-9B76-751FACE3ED48", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "94FEC1E6-58FD-47C1-B05E-80BAE3840532", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "503ED662-BA21-469D-9FDC-73622786B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.43.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6F55273-3CA7-4432-9D43-951EC943E2B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.44.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BDE742-DE38-444B-9B40-6F14D6047B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "90646244-2B6C-402F-9835-9D540DE1EBC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient boundary checks when decoding JSON in TryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7." }, { "lang": "es", "value": "Comprobaciones de l\u00edmites insuficientes cuando se decodifica JSON en TryParse lee la memoria fuera de l\u00edmites, conllevando potencialmente a una DOS. Este problema afecta a HHVM versiones 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versiones entre 4.33.0 y 4.38.0 (inclusive), y versiones entre 4.9.0 y 4.32.0 (inclusive), y versiones anteriores a 4.8.7." } ], "id": "CVE-2020-1893", "lastModified": "2024-11-21T05:11:33.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-03T15:15:12.057", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/bd586671a3c22eb2f07e55f11b3ce64e1f7961e7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2020/02/20/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-10 16:15
Modified
2024-11-21 05:11
Severity ?
Summary
xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
cve-assign@fb.com | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "069C0B7D-5233-4EFF-BBA7-8B84D9227044", "versionEndExcluding": "4.56.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DAD37C-9F51-4BE3-B045-537CA259F7F7", "versionEndExcluding": "4.80.2", "versionStartIncluding": "4.57.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B78720F-AA79-459F-A66C-5C4D67D7EE31", "versionEndExcluding": "4.93.2", "versionStartIncluding": "4.81.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B9A3C-6A5A-45C4-A490-C13CF6D6A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "matchCriteriaId": "18D33DC0-E6A7-4DC6-8E9A-2B85842EC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0B9078D-3C25-45B2-B5F2-59585A47BACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B8F5C11-8610-4099-8A45-E6241F3D24E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FF13C3-19DC-4F53-BF9D-38AC89D647D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." }, { "lang": "es", "value": "La funci\u00f3n xbuf_format_converter, usada como parte de exif_read_data, estaba agregando un car\u00e1cter null de terminaci\u00f3n a la cadena generada, pero no estaba usando su funci\u00f3n est\u00e1ndar append char.\u0026#xa0;Como resultado, si el b\u00fafer estuviera lleno, resultar\u00eda en una escritura fuera de l\u00edmites.\u0026#xa0;Este problema afecta HHVM versiones anteriores a 4.56.3, todas las versiones entre 4.57.0 y 4.80.1, todas las versiones entre 4.81.0 y 4.93.1 y las versiones 4.94.0, 4.95.0, 4.96.0, 4.97.0 , 4.98.0" } ], "id": "CVE-2020-1917", "lastModified": "2024-11-21T05:11:36.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-10T16:15:14.313", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "cve-assign@fb.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-10 19:15
Modified
2025-01-27 19:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3.
Applications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "91487128-B88B-4E14-B1EB-D034775108B7", "versionEndExcluding": "4.153.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEBC2B2-0FDF-46EB-80B0-F1E8ED6CE459", "versionEndExcluding": "4.168.2", "versionStartIncluding": "4.154.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB8AEBFD-04EE-419A-A080-0B123FDFEF78", "versionEndExcluding": "4.169.2", "versionStartIncluding": "4.169.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "47EC3B3C-6874-4F23-A906-52B13EE7DD9F", "versionEndExcluding": "4.170.2", "versionStartIncluding": "4.170.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.171.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDC50CD5-5AF7-4331-810C-D489A4FF3FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:facebook:hhvm:4.172.0:*:*:*:*:*:*:*", "matchCriteriaId": "89209682-1753-4B6B-8AF4-E7701F493C59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3.\n\nApplications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected." } ], "id": "CVE-2022-36937", "lastModified": "2025-01-27T19:15:13.297", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-10T19:15:08.627", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2023/01/20/security-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://hhvm.com/blog/2023/01/20/security-update.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/11/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/19/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "157280C9-2498-4181-BF93-3F1017445394", "versionEndIncluding": "3.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow." }, { "lang": "es", "value": "Desbordamiento de enteros en bcmath en Facebook HHVM en versiones anteriores a 3.15.0 permite a atacantes tener un impacto no especificado a trav\u00e9s de vectores desconocidos, lo que desencadena un desbordamiento de b\u00fafer." } ], "id": "CVE-2016-6871", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.013", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }